Lightweight Anonymous Authentication Protocols for RFID Systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lightweight RFID Authentication Protocols for Special Schemes

This thesis addresses the problem of providing secure protocols for the practical application of low cost Radio-Frequency Identification (RFID) tags. This is particularly challenging because the tags are limited in cryptographic functionality and general performance, but also when there is a need to read multiple tags in a range of practical environments whilst maintaining data privacy. Several...

متن کامل

Secure ubiquitous authentication protocols for RFID systems

In this article, the possible privacy and security threats to the radio frequency identification (RFID) systems are investigated and new authentication protocols are proposed which provide the identified privacy and security in a very efficient manner for a ubiquitous computing environment. The approach utilizes the concepts of two very different, widely known RFID protocols, i.e. the “low-cost...

متن کامل

Weaknesses in Two Recent Lightweight RFID Authentication Protocols

The design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many algorithms have been published lately. In this paper, we analyze two recent proposals in this research area. First, Mitra’s scheme is scrutinized, revealing its vulnerability to cloning and traceability attacks, which are among the security objectives pursued in the p...

متن کامل

Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols

In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and MAP, which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchronization between the RFID reader and the tag in a singl...

متن کامل

Grobner Basis Attacks on Lightweight RFID Authentication Protocols

Since security and privacy problems in RFID systems have attracted much attention, numerous RFID authentication protocols have been suggested. One of the various design approaches is to use light-weight logics such as bitwise Boolean operations and addition modulo 2 between m-bits words. Because these operations can be implemented in a small chip area, that is the major requirement in RFID prot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE/ACM Transactions on Networking

سال: 2017

ISSN: 1063-6692,1558-2566

DOI: 10.1109/tnet.2016.2631517