Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
نویسندگان
چکیده
منابع مشابه
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for lo...
متن کاملLightweight Authentication Protocol for Low-Cost RFID Tags
Providing security in low-cost RFID tags is a challenging task because tags are highly resource constrained and cannot support strong cryptography. Special lightweight algorithms and protocols need to be designed that take into account the limitations of the tags. In this paper, we propose a set of extremely lightweight tag authentication protocols. We also provide an analysis of the proposed p...
متن کاملLMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags
Low-cost Radio Frequency Identification (RFID) tags are devices of very limited computational capabilities, where only 250-3K logic gates can be devoted to security-related tasks. Many proposals have recently appeared, but all of them are based on RFID tags using classical cryptographic primitives such as PRNGs, hash functions, block ciphers, etc. We believe this assumption to be fairly unreali...
متن کاملMutual Authentication Protocol for Low-cost RFID
Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a ubiquitous infrastructure. However, current low-cost RFID tags are highly resource-constrained and cannot support its long-term security, so they have potential risks and may violate privacy for their bearers. To remove security vulnerabilities, we propose a robust mutual auth...
متن کاملAn Ultra-lightweight RFID Seeking Protocol for Low-cost Tags
RFID systems are widely used in various applications, and attaching RFID tags to objects are increasing. Recently, Xie et al. defined RFID seeking concept which is finding a lost tag in a blind spot or a specified tag among lots of similar ones and proposed a lightweight RFID seeking protocol. Their protocol provides security and privacy against most of common malicious attacks. However, since ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of Network Security & Its Applications
سال: 2010
ISSN: 0975-2307
DOI: 10.5121/ijnsa.2010.2203