Biometric based RFID tag mutual authentication protocol defending against illegitimate access

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol

Radio frequency identification systems need secure protocols to provide confidentiality, privacy protection, mutual authentication, etc. These protocols should resist active and passive attacks such as forgery, traceability, replay and de-synchronization attacks. Cho et al. recently proposed a hash-basedmutual authentication protocol (Cho et al., 2012) and claimed that their scheme addresses al...

متن کامل

Defending RFID authentication protocols against DoS attacks

In this paper, we present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, we point out that in the O-FRAP protocol, the server can be subject to a denial-of-service attack due to a flaw in the database querying procedure. Our attack also applies to ...

متن کامل

Multi-domain Rfid Access Control Using Asymmetric Key Based Tag-reader Mutual Authentication

Multi-domain RFID applications, such as asset tracking across domains, shift the paradigm in business model and enable next-generation business processes for aviation industry. The increasing number of RFID applications also merits the consolidation of RFID tags so they can serve multiple purposes. However, the adoption of such multi-domain RFID applications depends on their ability to enforce ...

متن کامل

Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of ...

متن کامل

An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System

Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, ...). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Malaya Journal of Matematik

سال: 2018

ISSN: 2319-3786,2321-5666

DOI: 10.26637/mjm0s01/18