Filters








2,271 Hits in 3.1 sec

When Compromised Readers Meet RFID [chapter]

Gildas Avoine, Cédric Lauradoux, Tania Martin
2009 Lecture Notes in Computer Science  
We stress in this paper the problem of compromised readers and its impact in practice.  ...  We show that none of the reviewed protocols fits the required properties in case of compromised readers.  ...  The Problem of Privacy with Compromised Readers We focus in this section on the problem of tag privacy when a system has compromised readers.  ... 
doi:10.1007/978-3-642-10838-9_4 fatcat:c4k3ksapfjbxzah56ljgmx2ebq

Reducing RFID reader load with the meet-in-the-middle strategy

Jung Hee Cheon, Jeongdae Hong, Gene Tsudik
2012 Journal of Communications and Networks  
In almost any RFID system, a reader needs to identify, and optionally authenticate, a multitude of tags.  ...  Our technique is based on the well-known "meet-in-themiddle" strategy used in the past to attack certain symmetric ciphers.  ...  Conclusion We proposed efficient and secure RFID tag identification and authentication technique using the well-known meet-in-the-middle strategy.  ... 
doi:10.1109/jcn.2012.6184545 fatcat:e345pseokjbbjotwpp73vqs76q

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems

Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. Ni
2007 Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)  
To achieve this goal, RFID tags issue encrypted authentication messages to the RFID reader, and the reader searches the key space to locate the tags.  ...  The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking tags' private information  ...  Therefore, a secure RFID system must meet two requirements.  ... 
doi:10.1109/percom.2007.13 dblp:conf/percom/LuHHLN07 fatcat:5nx4er2gknagtknj4pkhnrsvee

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems

Li Lu, Jinsong Han, Lei Hu, Lionel M. Ni
2012 International Journal of Distributed Sensor Networks  
To achieve this goal, RFID tags issue encrypted authentication messages to the RFID reader, and the reader searches the key space to locate the tags.  ...  The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking tags' private information  ...  Therefore, a secure RFID system must meet two requirements.  ... 
doi:10.1155/2012/153912 fatcat:a26zsh4v7nbq7mezgiyvzxnikq

RFID Authentication Against an Unsecure Backend Server [article]

Wei Xie, Chen Zhang, Quan Zhang, Chaojing Tang
2014 arXiv   pre-print
Moreover, it is the first scheme meeting the special security and privacy requirement for a cloud-based RFID authentication scenario in which the backend server is untrustworthy to readers held by cloud  ...  It disables existing RFID authentication protocols from being safely applied to a reallife scenario in which the backend server is actually vulnerable, compromised or even malicious itself.  ...  A backend server is commonly easier to be compromised than an RFID reader.  ... 
arXiv:1304.1318v2 fatcat:hq4pcepfbjhhzcfhn3umgin3su

Privacy protection for RFID-based tracking systems

Chiu C. Tan, Qun Li, Lei Xie
2010 2010 IEEE International Conference on RFID (IEEE RFID 2010)  
Our protocol continues to protect user privacy in the event of partial compromise of a server.  ...  RFID technology is increasingly being deployed in ubiquitous computing environments for object tracking and localization.  ...  Compromise RFID reader: An adversary controlling an RFID reader will be able to read ω, n from a tag (Step (2) in Fig. 5) , and is assumed to know the location of the reader it has compromised.  ... 
doi:10.1109/rfid.2010.5467261 fatcat:hzt2rxnuc5h45lc6jue3aoo4rq

A Secure RFID Identity Reporting Protocol for Physical Attack Resistance

Zhaoyu Liu, Dichao Peng
2006 Journal of Communications  
Through physically attacks, attackers can get the secret identification-related information stored on RFID tags, and can later use the obtained information to impersonate legitimate readers for illegal  ...  In this paper we describe a threat model of RFID systems and present a detailed analysis of physical attacks on RFID tags and other security threats.  ...  In our protocol, the backend database can not derive a valid ID by decrypting the fake token generated by the tempering attackers so that the attack can be detected when the tag meets the authentic reader  ... 
doi:10.4304/jcm.1.4.31-40 fatcat:h7mio7stbzdm5fqnglttt5maje

Efficient And Timely Mutual Authentication Scheme For Rfid Systems

Hesham A. El Zouka, Mustafa M. Hosni
2015 Zenodo  
readers and their corresponding RFID tags.  ...  Therefore, security is often an important requirement for RFID systems.  ...  These aspects are as follows: RFID Randomization: In order to meet the demands of privacy in RFID system, which is achieved by randomizing the outputs of the tags, the associated reader must have an algorithm  ... 
doi:10.5281/zenodo.1109360 fatcat:bns7c2q5gfebbb7pjsu5jl66xe

Fast cloned-tag identification protocols for large-scale RFID systems

Kai Bu, Xuan Liu, Bin Xiao
2012 2012 IEEE 20th International Workshop on Quality of Service  
To secure RFID applications that confine tagged objects in the same RFID system, this paper studies the cloned-tag identification problem.  ...  Tag cloning attacks threaten a variety of Radio Frequency Identification (RFID) applications but are hard to prevent.  ...  To meet the time efficiency requirement for large-scale RFID systems, we seek to design protocols that can identify cloned tags as fast as possible.  ... 
doi:10.1109/iwqos.2012.6245962 dblp:conf/iwqos/BuLX12 fatcat:kaagliaeefakxpigybxrcazgs4

A Survey on Low-cost RFID Authentication Protocols [article]

Irfan Syamsuddin, Song Han, Vidyasagar Potdar, Tharam Dillon
2012 arXiv   pre-print
Finally, it is concluded that no single low cost RFID protocol fully meets the requirement of the given assessments.  ...  While a protocol satisfies one or two assessments, it fails to fully meet the requirement of the third assessment.  ...  Generally, RFID systems consist of Radio Frequency Identification (RFID) tags and RFID readers. While RF tags operate as transponders, RF readers act as transceivers.  ... 
arXiv:1009.3626v2 fatcat:ti3ir5ke45hrbdwbaw6j7t2mbu

AnonPri: A secure anonymous private authentication protocol for RFID systems

Farzana Rahman, Md Endadul Hoque, Sheikh Iqbal Ahamed
2017 Information Sciences  
Majority of the privacy preserving protocols for RFID systems require the reader to search all tags in the system in order to identify a single RFID tag which not efficient for large scale systems.  ...  However, the level of privacy provided by the scheme decreases as more and more tags are compromised.  ...  According to AnonPri, a similar kind of partitions is formed when tags become compromised.  ... 
doi:10.1016/j.ins.2016.07.038 fatcat:qarlw635lrhulecvcajgqon3ve

Severless Search and Authentication Protocols for RFID

Chiu C. Tan, Bo Sheng, Qun Li
2007 Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)  
The first is when α compromises the reader In our scheme, α can reuse the same nα and rα , but can- Ri . The second is when α compromises the tag Tj .  ...  This protocol works without a central database. 3 Evaluation Criteria However, the protocol does not consider the case when a reader has been compromised.  ... 
doi:10.1109/percom.2007.30 dblp:conf/percom/TanSL07 fatcat:wtmn4t2rhbb3lgxkz5lg2vvizq

MAP: Towards Authentication for Multiple Tags

Qingsong Yao, Jinsong Han, Saiyu Qi, Zhuo Liu, Shan Chang, Jianfeng Ma
2013 International Journal of Distributed Sensor Networks  
Existing PPA protocols employ the per-tag authentication, in which the reader has to sequentially authenticate the tags within the detecting region.  ...  Such a processing pattern becomes a bottleneck in current RFID enabled systems, especially for those batch-type processing applications.  ...  The protocol also meets the urgent need from real RFID applications.  ... 
doi:10.1155/2013/109439 fatcat:po7f7kpbkrd2xnwgya2jaxs2im

Randomizing RFID private authentication

Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiangyang Li, Yunhao Liu
2009 2009 IEEE International Conference on Pervasive Computing and Communications  
Such designs, being efficient, often fail to achieve forward secrecy and resistance to attacks, such as compromising and desynchronization.  ...  Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems.  ...  In most RFID authentication protocols, if not all, the updating process occurs when the reader R successfully authenticates a tag T. We denote A as the adversary.  ... 
doi:10.1109/percom.2009.4912773 dblp:conf/percom/YaoQHZLL09 fatcat:3ngleedh6zeuzch7ymgenmzkpq

Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
2010 International journal of network security and its applications  
The proposed protocol prevents passive attacks as active attacks are discounted when designing a protocol to meet the requirements of low cost RFID tags.  ...  However the implementation of the protocol meets the limited abilities of low cost RFID tags.  ...  Active attacks are discounted when designing a protocol to meet the requirements of ultralightweight RFID tags.  ... 
doi:10.5121/ijnsa.2010.2203 fatcat:hsnccrhstjhprnbr67bxfg74z4
« Previous Showing results 1 — 15 out of 2,271 results