Filters








26 Hits in 5.2 sec

On the Security of Tan et al. Serverless RFID Authentication and Search Protocols [chapter]

Masoumeh Safkhani, Pedro Peris-Lopez, Nasour Bagheri, Majid Naderi, Julio Cesar Hernandez-Castro
2013 Lecture Notes in Computer Science  
In this paper, we analyze the security of the mutual authentication and search protocols recently proposed by Tan et al. [20].  ...  combination with one of the search protocols.  ...  Tan et al. recently proposed a serverless mutual authentication and a search protocol for RFID systems [20] , both heavily based on the use of hash functions.  ... 
doi:10.1007/978-3-642-36140-1_1 fatcat:7owklz2kejdvxjyqtznro6grci

Serverless protocols for inventory and tracking with a UAV

Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette
2017 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC)  
To cite this version: Collins Isdory Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, et al.. Serverless protocols for inventory and tracking with a UAV.  ...  There are, however, domains in which UAVs may help to increase the safety of airplanes and the management of flights and airport resources that often require substantial human resources.  ...  Secure RFID Tag Search Protocols. Like serverless authentication protocols, the idea of secure RFID tag search protocols was introduced by Tan et al.  ... 
doi:10.1109/dasc.2017.8102113 fatcat:nfe3oivsurhtzedbcxulsgrgdu

Serverless Protocols for Inventory and Tracking with a UAV [article]

Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette
2017 arXiv   pre-print
There are, however, domains in which UAVs may help to increase the safety of airplanes and the management of flights and airport resources that often require substantial human resources.  ...  Among the considered applications are those that suggest using UAVs to enhance safety of on-ground airplanes; for instance, by collecting (once the aircraft has landed) data recorded by different systems  ...  Secure RFID Tag Search Protocols. Like serverless authentication protocols, the idea of secure RFID tag search protocols was introduced by Tan et al.  ... 
arXiv:1708.05417v1 fatcat:7ioynoxjd5asba5wjs2zmqitt4

Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud

Qingkuan Dong, Jiaqing Tong, Yuan Chen
2015 International Journal of Distributed Sensor Networks  
However, the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems.  ...  In this paper, a cloud-based RFID mutual authentication protocol without leaking location privacy to the cloud is proposed.  ...  Acknowledgment This work is supported by the National Natural Science Foundation of China (nos. 61373172, 61402353).  ... 
doi:10.1155/2015/937198 fatcat:rf4wgswzz5dcdprdfdbyysys6i

Untraceable and Serverless RFID Authentication and Search Protocols

Zeen Kim, Jangseong Kim, Kwangjo Kim, Imsung Choi, Taeshik Shon
2011 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops  
We then propose untraceable and serverless RFID authentication and search protocols with this method.  ...  In this paper, we first point out the tracing vulnerability of the existing serverless RFID protocols.  ...  Our search protocol outperforms TLS's three search protocols in the overhead of hash computation. Tan et al. as TSL and Han et al. as HDC in this paper.  ... 
doi:10.1109/ispaw.2011.66 fatcat:fduwvglkjjhhlcr7by4ki7ukra

Analysis on the Performance of Server-less RFID Searching Protocol

Ping Huang, Haibing Mu, Fei Zeng
2015 Journal of Computing and Information Technology  
Through analyzing some proposed protocols, we found that the probabilistic tracking attack is one of the major threats on the serverless RFID security protocols.  ...  The server-less searching protocol is extended from server-less authentication protocol and both of them are executed without the support from the backend servers.  ...  The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.  ... 
doi:10.2498/cit.1002549 fatcat:2n3xpekdpzbefgt73osxgk3d2a

Serverless lightweight mutual authentication protocol for small mobile computing devices

Collins Mtita, Maryline Laurent, Pascal Daragon
2015 2015 7th International Conference on New Technologies, Mobility and Security (NTMS)  
However, most smart constrained devices have limited resources and unable to run most of the classical protocols that provide robust security.  ...  Serverless lightweight mutual authentication protocol for small mobile computing devices. Abstract Small and inexpensive computing devices are becoming potential players in the Internet arena.  ...  This section analyzes some of the proposed serverless protocols for constrained devices. In 2008, Tan et al. [32] first introduced Serverless search and authentication RFID protocol.  ... 
doi:10.1109/ntms.2015.7266521 dblp:conf/ntms/MtitaLD15 fatcat:llnietq6rnhdlhxatiy6yraoeu

Secure and Private Protocols for Server-less RFID Systems

He Jialiang, Xu Youjun, Xu Zhiqiang
2014 International Journal of Control and Automation  
In this paper, based on a few existing RFID security protocols, a mutual RFID authentication protocol and its corresponding search protocol for server-less systems are proposed.  ...  ; in the fourth section, a mutual authentication protocol for serverless RFID systems is proposed; in the fifth section, corresponding search protocol for serverless systems is presented; in the sixth  ...  s server-less RFID search protocol and in the step3 of Tan et al.'  ... 
doi:10.14257/ijca.2014.7.2.13 fatcat:dfrjddmi6zdk3ff36uunuo535e

RFID seeking: Finding a lost tag rather than only detecting its missing

Wei Xie, Lei Xie, Chen Zhang, Qiang Wang, Jian Xu, Quan Zhang, Chaojing Tang
2014 Journal of Network and Computer Applications  
The proposed protocol is server-less, lightweight, privacy-friendly to both RFID readers and tags, and is secure against common attacks such as eavesdropping, manipulating, replaying, tracing, Denial of  ...  In this paper, detailed requirements for RFID seeking are suggested. The first secure RFID seeking protocol is proposed, meeting all the given requirements.  ...  Acknowledgments This work is partially supported by the National Natural Science Foundation of China under Grant nos. 61302091 and 61100196; the JiangSu Natural Science Foundation under Grant no.  ... 
doi:10.1016/j.jnca.2014.01.006 fatcat:h4kzmqn3jzasji6pvl4s2bukmq

Improving the Security of a Low-cost Tag Search Protocol

S. Saderi Oskuiee, F. Moazami, G. Oudi Ghadim
2021 Journal of electrical and computer engineering innovations  
Then we analyze the security of the improved protocol and prove its formal and informal security against known attacks.Conclusion: In this paper, we firstly analyze the security of Sundaresan et al.'  ...  : Most recently, Sundaresan et al. have proposed an RFID tag search protocol based on quadratic residues and 128 bit pseudo random number generators and XOR operation that can be easily implemented on  ...  Acknowledgement We would like to thank the anonymous reviewers for their valuable comments, which helped to increase the quality of our paper.  ... 
doi:10.22061/jecei.2020.7342.383 doaj:5e262e89033b46a3b4ca4da6cd3c79a2 fatcat:qh4em6rx6rdjje6rkrb4isy7ki

Secure and Serverless RFID Authentication and Search Protocols

Chiu Tan, Bo Sheng, Qun Li
2008 IEEE Transactions on Wireless Communications  
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users.  ...  We also suggest a protocol for secure search for RFID tags. We believe that as RFID applications become widespread, the ability to securely search for RFID tags will be increasingly useful.  ...  An alternative method for RFID authentication is based on a "challenge and response" between a reader and a tag. Juels et. al.  ... 
doi:10.1109/twc.2008.061012 fatcat:ho5v5pystfe7zdh22tq6qw6vvq

Privacy-Preserving RFID-Based Search System

Ji Young Chun, Geontae Noh
2021 Electronics  
The proposed protocol enables serverless RFID tag searches with passive tags, which obtain operating power from the mobile reader.  ...  First, the proposed protocol preserves the privacy of mobile reader users.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10050599 doaj:aab047668f8e40fbb2defc320e8b8446 fatcat:vkqlfnluyfd2bbflevv25ab6ui

An authenticated encryption based grouping proof protocol for RFID systems

Samad Rostampour, Nasour Bagheri, Mehdi Hosseinzadeh, Ahmad Khademzadeh
2016 Security and Communication Networks  
Search protocols are among the main applications of RFID systems.  ...  Using Ouafi-Phan model, BAN and AVISPA, we also checked the security correctness of the suggested protocol.  ...  In the third protocol, Tan et al.  ... 
doi:10.1002/sec.1718 fatcat:c45coblsungw7hsqhzrrm7npqm

Privacy-enhanced RFID Tag Search System [chapter]

Ji Young, Jung Yeon, Dong Hoon
2011 Advanced Radio Frequency Identification Design and Applications  
Recently, secure protocols for RFID tag search system are proposed for the first time (Tan et al., 2007; .  ...  Classification of previous RFID tag search protocols In this section, we classify previous RFID tag search protocols a; Hoque et al., 2009; Tan et al., 2007; Won et al., 2008; Zuo, 2009) which are designed  ...  This book focuses on the advances in RFID tag antenna and ASIC design, novel chipless RFID tag design, security protocol enhancements along with some novel applications of RFID.  ... 
doi:10.5772/15786 fatcat:iwrqzu7xpngk3dockj2cfajixu

Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols [chapter]

Ehsan Vahedi, Rabab K. Ward, Ian F. Blake
2011 Lecture Notes in Computer Science  
In this paper, we perform the security and privacy analysis of five lightweight protocols proposed in [1-4] and discuss their advantages and security issues.  ...  In order to address the security issues of RFID systems, various schemes have been proposed.  ...  The server-less protocol proposed by Tan et al. [3] . Tan et al. RFID Protocol In this Section, we explain the lightweight protocol proposed by Tan et al.  ... 
doi:10.1007/978-3-642-21323-6_12 fatcat:2lwvwt22gvdxvogoke33ueoiem
« Previous Showing results 1 — 15 out of 26 results