Cryptanalysisof two mutual authentication protocols for low-cost RFID
نویسندگان
چکیده
منابع مشابه
Cryptanalysis of two mutual authentication protocols for low-cost RFID
Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their s...
متن کاملMutual Authentication Protocol for Low-cost RFID
Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a ubiquitous infrastructure. However, current low-cost RFID tags are highly resource-constrained and cannot support its long-term security, so they have potential risks and may violate privacy for their bearers. To remove security vulnerabilities, we propose a robust mutual auth...
متن کاملTwo Ultralightweight Authentication Protocols for Low- Cost RFID Tags
The Radio Frequency Identification (RFID) system plays an important role in authentication, security control, supply chain management, and inventory control. Due to market consideration, low-cost RFID systems have become very popular in recent years. In many applications, such as e-passport, RFID systems need security mechanisms to resist all possible attacks and security risks. However, becaus...
متن کاملCryptanalysis and enhancement of two low cost rfid authentication protocols
Widespread attention is recently paid upon RFID system structure considering its ease of deployment over an extensive range of applications. Due to its several advantages, many technical articles are published to improve its capabilities over specific system implementations. Recently, a lightweight antide-synchronization RFID authentication protocol and a lightweight binding proof protocol to g...
متن کاملSecure and Low-cost RFID Authentication Protocols
In this paper we propose two RFID (Radio Frequency Identification) authentication protocols for secure and lowcost RFID systems. The first protocol SRAC (SemiRandomized Access Control) is designed using only a hash function as security primitives in tags. In spite of very restricted functionality, SRAC resolves not only security properties, such as the tracking problem, the forward secrecy and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed and Parallel systems
سال: 2011
ISSN: 2229-3957
DOI: 10.5121/ijdps.2011.2109