Filters








3,522 Hits in 4.5 sec

On the Security of RFID Group Scanning Protocols

Duc Nguyen DANG, Kwangjo KIM
2010 IEICE transactions on information and systems  
A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags.  ...  In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack.  ...  Acknowledgement This work was supported by the IT R&D program of MKE/TTA, 2009-P1-14-08I91, Mobile and next generation RFID technology standards development.  ... 
doi:10.1587/transinf.e93.d.528 fatcat:cfbm2vpifzcy5fjvx5yvedhmea

A survey on RFID security and provably secure grouping-proof protocols

Dang Nguyen Duc, Divyan M. Konidala, Hyunrok Lee, Kwangjo Kim
2010 International Journal of Internet Technology and Secured Transactions  
., Lee, H. and Kim, K. (2010) 'A survey on RFID security and provably secure grouping-proof protocols', Int. .  ...  In addition, we also present the first security definition for a secure grouping-proof protocol for RFID tags.  ...  This research was supported by the ICT Standardization program of the Ministry of Knowledge Economy (MKE).  ... 
doi:10.1504/ijitst.2010.037403 fatcat:ucfdv6wc4jbm7fbvjgucspolga

Provably Secure Grouping-Proofs for RFID Tags [chapter]

Mike Burmester, Breno de Medeiros, Rossana Motta
2008 Lecture Notes in Computer Science  
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are "simultaneously" scanned by a reader device.  ...  We present a security model for this application and give a formal description of the attending security requirements, focusing on the privacy (anonymity) of the grouped tags, and/ or forward-security  ...  Initial designs of RFID identification protocols focused on performance issues with lesser attention paid to resilience and security.  ... 
doi:10.1007/978-3-540-85893-5_13 fatcat:5qrto7veerhu7cbjkm7icfpyba

An improved proof for RFID tags

Thiti Nuamcherm, Piya Kovintavewat, Charturong Tantibundhit, Urachada Ketprom, Chaichana Mitrpant
2008 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology  
An RFID system consists of an RFID reader, a server connected to a database, and RFID tags attached to the objects needed to be identified.  ...  In addition, it can be extended to more-than-two-tag environment without much increasing total amount of time to scan all the tags.  ...  ACKNOWLEDGMENT This work was supported by National Science and Technology Development Agency (NSTDA) and the RFID Program, National Electronics and Computer Technology Center (NECTEC), Thailand, under  ... 
doi:10.1109/ecticon.2008.4600536 fatcat:7slew4y4abdihemlwka3fp7qba

An efficient and provably secure RFID grouping proof protocol

Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo
2017 Proceedings of the Australasian Computer Science Week Multiconference on - ACSW '17  
RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Various solutions have been proposed but most of them have security and privacy vulnerabilities.  ...  Various solutions have been proposed but most of them have security and privacy vulnerabilities. In this paper, we propose an elliptic-curvebased RFID grouping proof protocol.  ...  In other words, Adv secure A II = |P r[Exp secure S,A II (k) = 1]| ≤ . The privacy of grouping proof protocols is based on an indistinguishing experiment.  ... 
doi:10.1145/3014812.3014885 dblp:conf/acsw/ChengVMS17 fatcat:lopg43babrf5nd2t5qchxkjygi

Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs

Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede
2011 Personal and Ubiquitous Computing  
In this article, we extend the notion of public-key RFID authentication protocols, and propose a privacy-preserving multiparty grouping-proof protocol which relies exclusively on the use of Elliptic Curve  ...  Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generate evidence that they have been scanned simultaneously, various new schemes have been proposed.  ...  From a security point of view, the grouping proofs must be verifiable even if the RFID tags were scanned by an adversarial reader or if the tags were compromised by the adversary.  ... 
doi:10.1007/s00779-011-0392-2 fatcat:36skowyiqjeihbagdibch57omq

Security Vulnerabilities in RFID Networks

Junaid Ahsenali Chaudhry, Malrey Lee
2013 International journal of advanced smart convergence  
Nowaday's application, that is focused more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that became important for security.  ...  In this paper, the researcher explains existing security challenges in RFID networks then the effects of these threats on security and privacy of RFID are discussed.  ...  The same problem applies to other cryptographic primitives including MAC. Several group scanning protocols make use of a MAC algorithm.  ... 
doi:10.7236/ijasc2013.2.2.7 fatcat:lsynrr4srvcttpdredyqjkh57i

Analysis and Design of ECC-based RFID Grouping-proof Protocol

Kang Hong-yan
2015 Open Automation and Control Systems Journal  
Aiming at the issues of the existing RFID grouping-proof protocol in security and privacy, an ECC-based RFID grouping-proof protocol is proposed based on the privacy model and the identification protocol  ...  This article describes the proposed grouping-proof protocol and demonstrates in correctness, soundness and privacy.  ...  ACKNOWLEDGEMENTS This work is supported by scientific research project of Heze University (No. XY12KJ09) and the science and technology project of the Shandong province universities (No. J14LN21).  ... 
doi:10.2174/1874444301507011523 fatcat:jsfpyeesvndf5iw3xzb7qroqdq

An Anonymous Offline RFID Grouping-Proof Protocol

Zhibin Zhou, Pin Liu, Qin Liu, Guojun Wang
2018 Future Internet  
The protocol authorizes the reader to examine the validity of grouping-proof without knowing the identities of tags.  ...  From the security and performance analysis, the EAGP can protect the security and privacy of RFID tags, and defence impersonation and replay attacks.  ...  The well-known hardness of the ECDLP is crucial for the security of our elliptic curve scheme. Investigation of Kang's Protocol Literature [19] proposed a grouping-proof protocol based on ECC.  ... 
doi:10.3390/fi10010002 fatcat:s2xrc7rvyvfqngson4gk7pl7ui

Internet of Things and RFID Security Issues and Countermeasures Featuring the Biometric E-Passport: An Introductory Exploratory Research [article]

Leutele Grey
2013 Figshare  
This paper describes the capabilities of both IoT and RFID with a special focus on security issues and countermeasures.  ...  The combination of three technologies: Internet of Things (IoT), Radio Frequency Identification (RFID) and Biometric e-Passport with a special focus on Security Threats and Countermeasures.  ...  The ICAO standards provides the AA, PA BAC and EAC Protocol countermeasures to help minimise or eliminate security threats on e-Passports.  ... 
doi:10.6084/m9.figshare.820986.v1 fatcat:oseryh65frcp7f4os67fp4x4nm

A Study of Security Vulnerabilities in Mobile environment

Suk-jin Kim, Hyangran Lee, Malrey Lee
2015 The International Journal of Advanced Culture Technology  
Now day's application had focus more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that become important for security.  ...  In this paper, the researcher explains existing security challenges in RFID networks then the effects of these threats on security and privacy of RFID are discussed.  ...  was the first protocol to identify the multiple tag scanning issues.  ... 
doi:10.17703/ijact.2015.3.2.149 fatcat:dbf3vgagajf7va4pdxxbkqy4le

Analysis on the Performance of Server-less RFID Searching Protocol

Ping Huang, Haibing Mu, Fei Zeng
2015 Journal of Computing and Information Technology  
Through analyzing some proposed protocols, we found that the probabilistic tracking attack is one of the major threats on the serverless RFID security protocols.  ...  Based on the analysis, a practical conclusion is given which can be used in most of the server-less RFID systems.  ...  The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.  ... 
doi:10.2498/cit.1002549 fatcat:2n3xpekdpzbefgt73osxgk3d2a

Analyses of Security, Privacy Issues and Challenges for RFID System

Jung-Tae Kim
2011 Journal of information and communication convergence engineering  
Threat of RFID Protocol Some of the security properties of the previous proposed protocols are listed as follows. ▪ Confidentiality: This is a mechanism to guarantee a tag's privacy. ▪ Tag anonymity: As  ...  -Action threat: n individual's behavior is inferred by monitoring the action of a group of tags.  ... 
doi:10.6109/ijice.2011.9.6.701 fatcat:oe3o4geztzdyjkoq6kyvwqxs3m

A Scalable ECC-Based Grouping-proof Protocol for RFID Systems

Kang Hong-yan
2015 Open Automation and Control Systems Journal  
The paper has proposed a grouping-proof protocol that can conduct parallel processing, specific to the problem of low generation efficiency of the grouping-proof protocol of the existing RFID grouping  ...  proof scheme, based on the difficulty of the elliptic-curve discrete logarithm, by analyzing the insufficiency of the existing grouping-proof protocol design proposal.  ...  ACKNOWLEDGEMENTS This work is supported by scientific research project of heze university (No. XY12KJ09) and the science and technology project of the Shandong province universities (No. J14LN21).  ... 
doi:10.2174/1874444301507011674 fatcat:l3ygs3vatvegthahh4yznh3exy

Privacy Threats In Rfid Group Proof Schemes

HyoungMin Ham, JooSeok Song
2009 Zenodo  
If a group of RFID tags can be scanned simultaneously by one reader, RFID Group proof could be generated.  ...  Moreover, we propose a new attack model, which threats the privacy of user by tracking tags in a group.  ...  The purpose of the yoking proof is to generate a proof, which can be used to prove that a pair of RFID tags was scanned simultaneously by one reader.  ... 
doi:10.5281/zenodo.1334721 fatcat:uycxlphphrhlvpc52jrnwpyeb4
« Previous Showing results 1 — 15 out of 3,522 results