Lightweight Anonymous Authentication Protocols for RFID Systems
نویسندگان
چکیده
منابع مشابه
Lightweight RFID Authentication Protocols for Special Schemes
This thesis addresses the problem of providing secure protocols for the practical application of low cost Radio-Frequency Identification (RFID) tags. This is particularly challenging because the tags are limited in cryptographic functionality and general performance, but also when there is a need to read multiple tags in a range of practical environments whilst maintaining data privacy. Several...
متن کاملSecure ubiquitous authentication protocols for RFID systems
In this article, the possible privacy and security threats to the radio frequency identification (RFID) systems are investigated and new authentication protocols are proposed which provide the identified privacy and security in a very efficient manner for a ubiquitous computing environment. The approach utilizes the concepts of two very different, widely known RFID protocols, i.e. the “low-cost...
متن کاملWeaknesses in Two Recent Lightweight RFID Authentication Protocols
The design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many algorithms have been published lately. In this paper, we analyze two recent proposals in this research area. First, Mitra’s scheme is scrutinized, revealing its vulnerability to cloning and traceability attacks, which are among the security objectives pursued in the p...
متن کاملSecurity Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and MAP, which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchronization between the RFID reader and the tag in a singl...
متن کاملGrobner Basis Attacks on Lightweight RFID Authentication Protocols
Since security and privacy problems in RFID systems have attracted much attention, numerous RFID authentication protocols have been suggested. One of the various design approaches is to use light-weight logics such as bitwise Boolean operations and addition modulo 2 between m-bits words. Because these operations can be implemented in a small chip area, that is the major requirement in RFID prot...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE/ACM Transactions on Networking
سال: 2017
ISSN: 1063-6692,1558-2566
DOI: 10.1109/tnet.2016.2631517