Filters








1,988 Hits in 5.2 sec

PAP: A privacy and authentication protocol for passive RFID tags

Alex X. Liu, LeRoy A. Bailey
2009 Computer Communications  
In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags.  ...  Therefore, a security protocol for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader.  ...  Acknowledgements The authors would like to thank the anonymous reviewers for their constructive comments and suggestions on improving the presentation of this work. The work of Alex X.  ... 
doi:10.1016/j.comcom.2009.03.006 fatcat:zqkjct34snecdg7a2yrqze6n64

Security Vulnerabilities in RFID Networks

Junaid Ahsenali Chaudhry, Malrey Lee
2013 International journal of advanced smart convergence  
However, security and privacy issues and risks are introduced by pervasiveness of RFID systems. In RFID systems, communication between tag and reader usually takes place via wireless communication.  ...  The computational resources in RFID tag are constrained and it is a big limitation that forces researcher to apply different mitigations compared to common security solutions.  ...  It means that security and privacy have always been the main focus for every RFID systems and protocols [1] .  ... 
doi:10.7236/ijasc2013.2.2.7 fatcat:lsynrr4srvcttpdredyqjkh57i

A Study of Security Vulnerabilities in Mobile environment

Suk-jin Kim, Hyangran Lee, Malrey Lee
2015 The International Journal of Advanced Culture Technology  
However, security and privacy issues and risks are introduced by pervasiveness of RFID systems. In RFID systems, communication between tag and reader usually takes place via wireless communication.  ...  The computational resources in RFID tag are constrained and it is a big limitation that forces researcher to apply different mitigations compared to common security solutions.  ...  ACKNOWLEDGEMENTS This work (Grants No: 1401001175) was supported by Business for Academic-industrial Cooperative establishments funded Korea Small and Medium Business Administration in 2015.  ... 
doi:10.17703/ijact.2015.3.2.149 fatcat:dbf3vgagajf7va4pdxxbkqy4le

A Lightweight Authentication Protocol Based on Partial Identifier for EPCglobal Class-1 Gen-2 Tags

Zhicai Shi, Fei Wu, Yongxiang Xia, Yihan Wang, Jian Dai, Changzhi Wang
2015 Journal of Networks  
Lightweight authentication protocols are considered as an effective method to solve the security and privacy of lowcost RFID tags.  ...  RFID is a key technology that can be used to create the pervasive society. The tag is an important part of the RFID system and most popular tags are some low-cost passive tags.  ...  ACKNOWLEDGMENT We are grateful for the anonymous reviewers who made constructive comments so that we can improve and refine our paper.  ... 
doi:10.4304/jnw.10.6.369-375 fatcat:zhalwhql6rh5xnreuixpzu2zre

A Critical Analysis of RFID Security Protocols

Atif Sharif, Vidyasagar Potdar
2008 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)  
In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories.  ...  We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP and M2MAP. 1 confidentiality in communication between the tag and the reader. 2 reliability of the information  ...  Roberto Di Pietro and Refik Molva [15] proposed an identification and authentication protocol for RFID tags with two contributions aiming at enhancing the security and privacy of RFID based systems.  ... 
doi:10.1109/waina.2008.212 dblp:conf/aina/SharifP08 fatcat:gcbauiw3ajaa5olkhqmnkp7w5u

A Survey on Low-cost RFID Authentication Protocols [article]

Irfan Syamsuddin, Song Han, Vidyasagar Potdar, Tharam Dillon
2012 arXiv   pre-print
This paper presents a survey on several RFID authentication protocols under low cost restrictions. Low cost RFID are mainly addressed with limited security and privacy protections.  ...  This study provides a new insight in RFID literature which can be used particularly by small and medium industries to choose the appropriate RFID protocol for their needs.  ...  Mutual Authentication In [10] Han et al. proposed a new mutual authentication protocol for RFID tags.  ... 
arXiv:1009.3626v2 fatcat:ti3ir5ke45hrbdwbaw6j7t2mbu

STATE OF THE ART ON SECURE AND LOW COST RFID AUTHENTICATION PROTOCOLS FOR RFID BASED VEHICLE LICENSE PLATE

Irfan Syamsuddin
2013 International Journal on Smart Sensing and Intelligent Systems  
This study aims to provide a state of the art on RFID authentication protocols under low cost restriction as a foundation for decision maker for further development stage of RFID based vehicle license  ...  Index terms: RFID, vehicle plate license, smart identification, security and privacy, low cost, data protection, tracking prevention, and forward security.  ...  Mutual Authentication In [10] Han et al. proposed a new mutual authentication protocol for RFID tags.  ... 
doi:10.21307/ijssis-2017-621 fatcat:t4v2zlqvcfcz7ikopkxadbygea

Computational Cost Analysis on Securing RFID Protocols Conforming to EPC Class-1 Generation-2 Standard

Azam Zavvari, Masoud Shakiba, Mohammad Tariqul Islam, Elankovan Sundararajan, Mandeep Jit Singh
2013 Procedia Technology - Elsevier  
We presented an improvement mutual authentication protocol which can prevent the security problems and easy to implement in low-cost passive tags, with low computational cost.  ...  A Radio Frequency Identification (RFID) system is a contactless automatic identification system that uses small and low-cost tags.  ...  Acknowledgements All authors acknowledge reviewers for their constructive comments to improve the article.  ... 
doi:10.1016/j.protcy.2013.12.258 fatcat:ltbavtyhxzdn7do5g2u5xthtxy

User Privacy in RFID Networks [chapter]

Dave Singelée, Stefaan Seys
2010 ISSE 2009 Securing Electronic Business Processes  
Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.  ...  Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty  ...  Acknowledgements Dave Singelée's work was supported by the Interdisciplinary institute for Broadband Technology (IBBT) and in part by the Concerted Research Action (GOA) Ambiorics 2005/11 of the Flemish  ... 
doi:10.1007/978-3-8348-9363-5_20 dblp:conf/isse/SingeleeS09 fatcat:cszsov3bsfblti3iwszlotchw4

An Ultralightweight Mutual Authentication Protocol for Low Cost RFID Tags

R.K. Pateriya, Sangeeta Sharma
2011 International Journal of Computer Applications  
The universal deployment of RFID devices may expose new security and privacy risks. These risks are the main obstacle for successful deployment of RFID tags.  ...  The proposed protocol provides better solution for security and privacy risk as compared with Gossamer and other relevant protocols.  ...  PROPOSED PROTOCOL An ultralightweight RFID mutual Authentication protocol proposed in this section, which uses only bitwise operation to resolve the security and privacy issues for low-cost RFID tag.  ... 
doi:10.5120/3148-4352 fatcat:otayxeet4jastiw27p7vxu34i4

A Secure Mutual Authentication Protocol for Low-Cost RFID System [chapter]

N.W. Lo, Tzu-Li Yang, Kuo-Hui Yeh
2009 Development and Implementation of RFID Technology  
Section 2 reviews previous work on RFID authentication protocol. Next, we propose a new authentication scheme for low-cost RFID system in section 3.  ...  Therefore, in order to successfully defend against those security threats, we propose a new secure mutual authentication protocol for low-cost RFID systems, named as SMAP-LRS, to achieve higher security  ...  The authors gratefully acknowledge the support from TWISC projects sponsored by the National Science Council, Taiwan, under the Grants No NSC 96-2219-E-001-001 and NSC 96-2219-E-011-008.  ... 
doi:10.5772/6529 fatcat:qcjohsaxqbez5pp5uod6g2r5a4

Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard

Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, Mohammad Reza Aref
2016 2016 8th International Symposium on Telecommunications (IST)  
Although RFID systems provide user-friendly services for end-users, they can make security and privacy concerns for them.  ...  As a result, their protocol cannot provide security of RFID users in different authentication applications.  ...  As a result, the improved version of protocol can provide security and privacy of RFID end-users and is secure against various security and privacy attacks. IV.  ... 
doi:10.1109/istel.2016.7881793 dblp:conf/istel/AbdolmalekiBAA16 fatcat:fjq2kzwc3fhtjl7nbq3727irwa

Secure and Lightweight Authentication Protocol for Mobile RFID Privacy

Hyeong-Chan Lee, TaeYang Eom, Jeongi Yi
2013 Applied Mathematics & Information Sciences  
It shows that the same security level and performance can be obtained through passive tags.  ...  The proposed protocol meets various security requirements such as tag protection, location-and traffic-tracking prevention; the proposed protocol also meets other requirements such as lightweightness and  ...  Acknowledgement This work was supported by a grant from the KEIT funded by the Ministry of Knowledge Economy(10035219).  ... 
doi:10.12785/amis/070152 fatcat:lrew5oiefba7xlm4ci6o4qpw4i

Privacy-Preserving RFID-Based Search System

Ji Young Chun, Geontae Noh
2021 Electronics  
The proposed protocol enables serverless RFID tag searches with passive tags, which obtain operating power from the mobile reader.  ...  The employment of mobile readers (or mobile phone collaborated with a Radio frequency identification (RFID) reader) opens a novel application for RFID technology.  ...  Privacy Requirements We consider two kinds of privacy issues, one for passive RFID tags and the other for mobile readers.  ... 
doi:10.3390/electronics10050599 doaj:aab047668f8e40fbb2defc320e8b8446 fatcat:vkqlfnluyfd2bbflevv25ab6ui

A Strong Lightweight Authentication Protocol for Low-cost RFID Systems

Zhicai Shi, Josef Pieprzyk, Christophe Doche, Yongxiang Xia, Yu Zhang, Jian Dai
2014 International Journal of Security and Its Applications  
In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function.  ...  In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags.  ...  Acknowledgements We are grateful for the anonymous reviewers who made constructive comments so that we can improve and refine our paper.  ... 
doi:10.14257/ijsia.2014.8.6.20 fatcat:twcdopuxonhfxm74k2rtl2dkxq
« Previous Showing results 1 — 15 out of 1,988 results