Filters








1,111 Hits in 3.2 sec

Security of RFID Protocols – A Case Study

Ton van Deursen, Saša Radomirović
2009 Electronical Notes in Theoretical Computer Science  
We exhibit a flaw which has gone unnoticed in RFID protocol literature and present the resulting attacks on authentication, untraceability, and desynchronization resistance.  ...  In the context of Dolev-Yao style analysis of security protocols, we investigate the security claims of a recently proposed RFID authentication protocol.  ...  We have referred to other RFID protocols suffering from the same authentication flaw, but which to our knowledge have not been noticed to be flawed before.  ... 
doi:10.1016/j.entcs.2009.07.037 fatcat:ukyofftfezb5jdm26qj6xb6gjy

A Fuzzy Implementation of Bio metrics With Five Factor Authentication System For Secured Banking

S. Hemamalini, M. L. Alphin Ezhil Manuel
2012 International Journal of Smart Sensor and Adhoc Network.  
In a Generic Framework for Authentication, preserving security and privacy in distributed systems provide three factors for authentication of clients.  ...  This paper investigates a systematic approach for authenticating clients by five factors, namely RFID card, PIN, biometrics, One Time Password (OTP) and keypad ID.  ...  Security Issues The existing three-factor authentication protocols are flawed and cannot meet security requirements in their applications.  ... 
doi:10.47893/ijssan.2012.1070 fatcat:boifsnsxz5cptneil5hzlxsefi

Securing key exchange and key agreement security schemes for RFID passive tags

Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, Seyed Mohammad Alavi, Mohammad Reza Aref
2016 2016 24th Iranian Conference on Electrical Engineering (ICEE)  
Finally, the improved protocols are compared with some similar protocols in terms of security and privacy.  ...  In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users.  ...  s protocol and proposed a RFID mutual authentication protocol.  ... 
doi:10.1109/iraniancee.2016.7585754 fatcat:zcuv7sywzjcdxbhasjumd3vxbm

Implementation of Cloud Technology for Remote Data Access for Library Management using ARM11

Sameer R.Karadkar, Uttam L. Bombale
2014 International Journal of Computer Applications  
General Terms RFID identification, Wiegand protocol, ARM 11 controller, Cloud, Raspberry PI .  ...  Library has always been an area of optimization in terms of the flaws and drawbacks of conventional systems.  ...  Study regarding the mechanism of sensing in RFID tags and corresponding issues in the RFID technology are addressed [6] .  ... 
doi:10.5120/17401-7965 fatcat:gi3l3fomtrgi5ne37ibtjxjoeu

An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol

Xuping Ren, Xianghua Xu, Yunfa Li
2013 Journal of Computers  
In this paper, a new oneway hash function based mutual authentication protocol is proposed to address such security and privacy problems.  ...  With the widespread development of RFID technology, security and privacy issues become more prominent in RFID applications.  ...  ACKNOWLEDGMENT This work was supported in part by a grant from ZheJiang science and technology plan key project, No. 2007 c11023.  ... 
doi:10.4304/jcp.8.9.2405-2412 fatcat:r5rgegavivdvdn3kswpxcxl2oa

A Survey of RFID Authentication Protocols Based on Hash-Chain Method [article]

Irfan Syamsuddin, Tharam Dillon, Elizabeth Chang, Song Han
2010 arXiv   pre-print
Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication.  ...  Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems.  ...  However, it is confirmed that this protocol is flawed to certain replay attacks.  ... 
arXiv:1008.2452v1 fatcat:apyxrib2efh3bm722phuizym44

On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup [chapter]

Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert Deng
2009 Lecture Notes in Computer Science  
In ASIACCS'08, Burmester, Medeiros and Motta proposed an anonymous RFID authentication protocol (BMM protocol [2]) that preserves the security and privacy properties, and achieves better scalability compared  ...  To counteract such flaw, we improve the BMM protocol so that it maintains all the security and efficiency properties as claimed in [2] .  ...  This work is partly supported by A*Star SERC Grant No. 082 101 0022 in Singapore.  ... 
doi:10.1007/978-3-642-10772-6_7 fatcat:biu5ils6ujfzdmsxt3chhwva6a

Supporting recovery, privacy and security in RFID systems using a robust authentication protocol

Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed
2009 Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09  
In this paper, we propose a Robust Authentication Protocol (RoAP) that supports not only security and privacy, but also recovery in RFID systems.  ...  Finally, we present the implementation of our authentication protocol.  ...  However, authentication protocol 2 is secured against all major attacks. But the major flaw of this protocol lacks recovery support.  ... 
doi:10.1145/1529282.1529514 dblp:conf/sac/HoqueRA09 fatcat:rr5j5mutznevlhnfeiujsig65e

Unbalanced states violates RFID privacy

Imran Erguler, Emin Anarim, Gokay Saldamli
2012 Journal of Intelligent Manufacturing  
To illustrate this brutal security flaw, we conduct our analysis on different RFID protocols.  ...  A class of these proposals contains RFID protocols where the server authenticates the tag in a negligible constant/sub-linear time for a more frequent normal state and needs a linear search in a rare abnormal  ...  In Dimitriou (2005) proposed an RFID authentication protocol which needs O(1) effort for a server to authenticate a tag.  ... 
doi:10.1007/s10845-012-0655-4 fatcat:j6blzkimgjcctocsqacctqpeiu

Attacks and Defenses in Short-Range Wireless Technologies for IoT

Karim Lounis, Mohammad Zulkernine
2020 IEEE Access  
Namely, we consider Wi-Fi, Bluetooth, ZigBee, and RFID wireless communication technologies.  ...  part of IoT in particular.  ...  These attacks are mainly due to a partial implementation of authentication on network traffic or due to some flaws in the authentication protocols.  ... 
doi:10.1109/access.2020.2993553 fatcat:jtcl7llvy5crjaktwmvchlmcxa

Cryptanalysis and Enhancement of Two Low Cost RFID Authentication Protocols

Hoda Jannati
2012 International Journal of UbiComp  
This paper also addresses appropriate solutions to fix the security flaws concerning the two described protocols for secure RFID applications.  ...  Recently, a lightweight anti-desynchronization RFID authentication protocol and a lightweight binding proof protocol to guard patient safety are proposed.  ...  In 2010, Zhuo et al. proposed a lightweight anti-de-synchronization RFID authentication protocol [15] . They claimed their protocol would be secure against all attacks on RFID systems.  ... 
doi:10.5121/iju.2012.3101 fatcat:raeifpsi2zaergm4t7b42hoxte

Cryptanalysis and enhancement of two low cost rfid authentication protocols [article]

Hoda Jannati, Abolfazl Falahati
2012 arXiv   pre-print
This paper also addresses appropriate solutions to fix the security flaws concerning the two described protocols for secure RFID applications.  ...  Recently, a lightweight anti-de-synchronization RFID authentication protocol and a lightweight binding proof protocol to guard patient safety are proposed.  ...  In 2010, Zhuo et al. proposed a lightweight anti-de-synchronization RFID authentication protocol [15] . They claimed their protocol would be secure against all attacks on RFID systems.  ... 
arXiv:1202.1971v1 fatcat:llpf7fgunnaenbw7ik6dz4wxve

Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks

Wiem Tounsi, Joaquin Garcia-Alfaro, Nora Cuppens-Boulahia, Frédéric Cuppens
2010 2010 8th Annual Communication Networks and Services Research Conference  
We analyze especially the problem of exchanging secrets to satisfy authentication of entities.  ...  We address security solutions to protect the communication of the wireless components of a home health care system.  ...  Proactive Evolution of Keys An alternative solution that addresses the security flaws of Protocol 2 is presented in this section.  ... 
doi:10.1109/cnsr.2010.38 dblp:conf/cnsr/TounsiGCC10 fatcat:pispq3aatrh67fj5wc7zwx4jfm

MUMAP: Modified Ultralightweight Mutual Authentication protocol for RFID enabled IoT networks

Mehedi Hasan Raju, Mosabber Uddin Ahmed, Md Atiqur Rahman Ahad
2021 Journal of the Institute of Industrial Applications Engineers  
Flawed authentication protocols led to the need for a secured protocol for radio frequency identification (RFID) techniques.  ...  Lightweight operations like XOR and Left Rotation, are used to circumvent the flaws made in the other protocols. Proposed protocol has three-phase of authentication.  ...  We have addressed the problems generated in the protocol Tewari and Gupta [16] and are proposing a new RFID ultralightweight authentication protocol.  ... 
doi:10.12792/jiiae.9.33 fatcat:qjbyrqql4nfjvhvmugn45kc6ay

A Salient Missing Link in RFID Security Protocols

Imran Erguler, Emin Anarim, Gokay Saldamli
2011 EURASIP Journal on Wireless Communications and Networking  
In this respect, careless deployments of "secure" RFID authentication protocols are not exceptions and subject to side channel attacks.  ...  Focusing on lightweight RFID security protocols; we examine the server responses for several RFID tags and realize that if the database querying is performed through a static process, the RFID system is  ...  The SM Protocol and Analysis. Song and Mitchell proposed an RFID authentication protocol in [5] .  ... 
doi:10.1155/2011/541283 fatcat:mgib5k4kv5ajnpxqq2dsz65nuy
« Previous Showing results 1 — 15 out of 1,111 results