PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Security Standards for the RFID Market
IEEE Security and Privacy
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Security of ultra-lightweight RFID authentication protocols and its improvements
ACM SIGOPS Operating Systems Review
IEEE Transactions on Dependable and Secure Computing
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
A novel mutual authentication scheme based on quadratic residues for RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
With anti-counterfeit ownership transfer for RFID system
ELECTROSCIENCE'08 Proceedings of the 6th WSEAS International Conference on Applied Electromagnetics, Wireless and Optical
Anti-counterfeit ownership transfer protocol for low cost RFID system
WSEAS Transactions on Computers
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
New mutual agreement protocol to secure mobile RFID-enabled devices
Information Security Tech. Report
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
Proceedings of the second ACM conference on Wireless network security
Secure RFID authentication scheme for EPC class Gen2
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
Information Security Applications
A Security and Performance Evaluation of Hash-Based RFID Protocols
Information Security and Cryptology
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
Computer Communications
Cellular automata-based authentication for low-cost RFID systems
International Journal of Communication Networks and Distributed Systems
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
Computer Standards & Interfaces
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Journal of Parallel and Distributed Computing
Algebraic Attacks on RFID Protocols
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Engineering Applications of Artificial Intelligence
RFID privacy: relation between two notions, minimal condition, and efficient construction
Proceedings of the 16th ACM conference on Computer and communications security
Analysis of RFID mutual authentication protocols
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
A secure and efficient authentication protocol for passive RFID tags
ISWCS'09 Proceedings of the 6th international conference on Symposium on Wireless Communication Systems
A Lightweight Authentication Protocol for Low-Cost RFID
Journal of Signal Processing Systems
A lightweight RFID protocol using substring
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
An efficient mutual authentication protocol on RFID tags
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
Expert Systems with Applications: An International Journal
A lightweight anti-desynchronization RFID authentication protocol
Information Systems Frontiers
A survey on RFID security and provably secure grouping-proof protocols
International Journal of Internet Technology and Secured Transactions
Improvement of the RFID authentication scheme based on quadratic residues
Computer Communications
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
Weaknesses in two recent lightweight RFID authentication protocols
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Two RFID-based Solutions to Enhance Inpatient Medication Safety
Journal of Medical Systems
Security Problems in an RFID System
Wireless Personal Communications: An International Journal
Scalability and Security Conflict for RFID Authentication Protocols
Wireless Personal Communications: An International Journal
Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
SAPCC1G2: a mutual authentication protocol promote the security of RFID and WSN integration system
International Journal of Communication Networks and Distributed Systems
Expert Systems with Applications: An International Journal
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
An attack on an RFID authentication protocol conforming to EPC class 1 generation 2 standard
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
Lightweight RFID mutual authentication protocol against feasible problems
ICICS'11 Proceedings of the 13th international conference on Information and communications security
A review of RFID technology and its managerial applications in different industries
Journal of Engineering and Technology Management
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
Security flaws in a recent RFID delegation protocol
Personal and Ubiquitous Computing
Lightweight authentication for RFID used in VANETs
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
RFID system for public train transportation
Security and Communication Networks
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
PUF-Based RFID authentication protocol against secret key leakage
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Utilize Common Criteria Methodology for Secure Ubiquitous Healthcare Environment
Journal of Medical Systems
Simulation of anti-relay attack schemes for RFID ETC system
Proceedings of the 15th Communications and Networking Simulation Symposium
A minimum disclosure approach to authentication and privacy in RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Based on mobile RFID for membership stores system conforming EPC C1G2 standards
International Journal of Ad Hoc and Ubiquitous Computing
A near field communication-driven home automation framework
Personal and Ubiquitous Computing
An Ownership Transfer Scheme Using Mobile RFIDs
Wireless Personal Communications: An International Journal
Critical Evaluation of RFID Security Protocols
International Journal of Information Security and Privacy
Wireless Personal Communications: An International Journal
Strengthening the Security of EPC C-1 G-2 RFID Standard
Wireless Personal Communications: An International Journal
Two RFID Standard-based Security Protocols for Healthcare Environments
Journal of Medical Systems
RFID Authentication Protocol to Enhance Patient Medication Safety
Journal of Medical Systems
On the security of RFID anti-counting security protocol (ACSP)
Journal of Computational and Applied Mathematics
Design of a secure RFID authentication scheme preceding market transactions
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Unbalanced states violates RFID privacy
Journal of Intelligent Manufacturing
Hi-index | 0.01 |
As low-cost Radio Frequency Identification (RFID) will become pervasive in our daily lives, RFID systems may create new threats to the security and privacy of individuals and organizations. However, the previous works on designing security protocols for RFID either do not conform to the EPC Class 1 Generation 2 standards or suffer from security flaws. This paper will point out the weaknesses of two EPC Class 1 GEN-2-conformed security protocols, and then proposes our new protocol, which raises the security level and conforms to the EPC Class 1 GEN-2 standards.