Universally composable and forward-secure RFID authentication and authenticated key exchange
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Protocols for RFID tag/reader authentication
Decision Support Systems
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Robust, anonymous RFID authentication with constant key-lookup
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Mutual authentication in RFID: security and privacy
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Hash Functions and RFID Tags: Mind the Gap
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Provably Secure Grouping-Proofs for RFID Tags
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
International Journal of Applied Cryptography
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
Scalable privacy protecting scheme through distributed RFID tag identification
Proceedings of the workshop on Applications of private and anonymous communications
Security co-existence of wireless sensor networks and RFID for pervasive computing
Computer Communications
Efficient RFID authentication protocols based on pseudorandom sequence generators
Designs, Codes and Cryptography
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
Proceedings of the second ACM conference on Wireless network security
Secure RFID authentication scheme for EPC class Gen2
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A hybrid approach for privacy-preserving RFID tags
Computer Standards & Interfaces
A Security and Performance Evaluation of Hash-Based RFID Protocols
Information Security and Cryptology
Securing RFID Systems by Detecting Tag Cloning
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
A Highly Scalable RFID Authentication Protocol
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
Computer Standards & Interfaces
Secure EPC Gen2 Compliant Radio Frequency Identification
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Engineering Applications of Artificial Intelligence
An efficient forward private RFID protocol
Proceedings of the 16th ACM conference on Computer and communications security
Evaluation of the simple mutual authentication protocol for ISO/IEC 14443 smart cards
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
Towards lightweight secure communication protocols for passive RFIDs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Anonymizer-Enabled Security and Privacy for RFID
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
International Journal of Security and Networks
Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
LRMAP: lightweight and resynchronous mutual authentication protocol for RFID system
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Privacy-aware multi-context RFID infrastructure using public key cryptography
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Privacy protection scheme of RFID using random number
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Low-cost and strong-security RFID authentication protocol
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Anonymous mutual authentication protocol for RFID tag without back-end database
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Untraceability of RFID protocols
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Read / write performance for low memory passive HF RFID tag-reader system
Journal of Theoretical and Applied Electronic Commerce Research
New privacy results on synchronized RFID authentication protocols against tag tracing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
SEAS: a secure and efficient anonymity scheme for low-cost RFID tags
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Performance analysis of the simple lightweight authentication protocol
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Refresh: weak privacy model for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
e-Passports as a means towards a Globally Interoperable Public Key Infrastructure
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Anti-collision protocol for RFID-sensor network and the security threats
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
Physical-layer identification of RFID devices
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Physical-layer identification of UHF RFID tags
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
A secure RFID ticket system for public transport
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Lightweight privacy preserving authentication for RFID using a stream cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Classifying RFID attacks and defenses
Information Systems Frontiers
A lightweight anti-desynchronization RFID authentication protocol
Information Systems Frontiers
Time measurement threatens privacy-friendly RFID authentication protocols
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Towards a practical solution to the RFID desynchronization problem
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
Performance comparison of the authentication protocols in RFID system
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Secure and scalable RFID authentication protocol
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Diffusing RFID-sensor networks and security threats
WSEAS Transactions on Signal Processing
Scalability and Security Conflict for RFID Authentication Protocols
Wireless Personal Communications: An International Journal
On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
RFID enabled traceability networks: a survey
Distributed and Parallel Databases
Lightweight RFID mutual authentication protocol against feasible problems
ICICS'11 Proceedings of the 13th international conference on Information and communications security
RFID systems: a survey on security threats and proposed solutions
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A robust and secure RFID-based pedigree system (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A scalable and untraceable authentication protocol for RFID
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Vulnerability of an RFID authentication protocol proposed in at secubiq 2005
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Security flaws in a recent RFID delegation protocol
Personal and Ubiquitous Computing
Privacy for public transportation
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Practical schemes for privacy and security enhanced RFID
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
EPCBC: a block cipher suitable for electronic product code encryption
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Addressing flaws in RFID authentication protocols
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
RFID system for public train transportation
Security and Communication Networks
PUF-Based RFID authentication protocol against secret key leakage
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Fast cloned-tag identification protocols for large-scale RFID systems
Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
E-passports as a means towards the first world-wide public key infrastructure
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
A study on low-cost RFID system management with mutual authentication scheme in ubiquitous
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
An improved anti-collision algorithm for ISO15693 RFID systems
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Security and Privacy Analysis of Song---Mitchell RFID Authentication Protocol
Wireless Personal Communications: An International Journal
A holistic approach examining RFID design for security and privacy
The Journal of Supercomputing
Improving the efficiency of RFID authentication with pre-computation
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
Journal of Computational and Applied Mathematics
Improvement of the Hash-Based RFID Mutual Authentication Protocol
Wireless Personal Communications: An International Journal
Unbalanced states violates RFID privacy
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
RFID identification is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to yield great productivity gains or "smart applications for users. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this work we present an RFID authentication protocol that enforces user privacy and protects against tag cloning. We designed our protocol with both tag-to-reader and reader-to-tag authentication in mind; unless both types of authentication are applied, any protocol can be shown to be prone to either cloning or privacy attacks. Our scheme is based on the use of a secret shared between tag and database that is refreshed to avoid tag tracing. However, this is done in such a way so that efficiency of identification is not sacrificed. Additionally, our protocol is very simple and it can be implemented easily with the use of standard cryptographic hash functions. In analyzing our protocol, we identify several attacks that can be applied to RFID protocols and we demonstrate the security of our scheme. Furthermore, we show how forward privacy is guaranteed; messages seen today will still be valid in the future, even after the tag has been compromised.