نتایج جستجو برای: rfid authentication protocols

تعداد نتایج: 139141  

Journal: :IJCNIS 2017
Eyad Salah Taqieddin

Mutual authentication is essential to guarantee the confidentiality, integrity, and availability of an RFID system. One area of interest is the design of lightweight mutual authentication protocols that meet the limited computational and energy resources of the tags. These protocols use simple operations such as permutation and cyclic redundancy code for cryptographic purposes. However, these f...

Journal: :CoRR 2009
Tzipora Halevi Nitesh Saxena Shai Halevi

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlyi...

Journal: :IACR Cryptology ePrint Archive 2009
Ton van Deursen Sasa Radomirovic

It is well-known that protocols that satisfy a security property when executed in isolation do not necessarily satisfy the same security property when they are executed in an environment containing other protocols. We demonstrate this fact on a family of recently proposed RFID protocols by Lee, Batina, and Verbauwhede. We invalidate the authentication and untraceability claims made for several ...

2010
Ya-Fen Chang

A family of lightweight authentication protocols, HB-family, has been proposed for low-computationload-required applications such as radio frequency identification (RFID). Security of this family is based on the learning parity with noise (LPN) problem which has been proven to be an NP-complete problem. But, we find that security of these LPN-problem-based protocols is doubted. We will demonstr...

2006
Selwyn Piramuthu

Lightweight authentication protocols are necessary in Radio-Frequency Identification (RFID) applications due to tag-level constraints. Over the past few years, several such protocols have been proposed and analyzed. We focus on the HB protocol and its variants. We show the vulnerability of some of these to attacks on tags, where the adversary pretends to be a valid reader, and propose a modifie...

Journal: :IACR Cryptology ePrint Archive 2016
Masoumeh Safkhani Nasour Bagheri

Tian et al. proposed a permutation based authentication protocol [19] entitled RAPP. However, it came out very soon that it suffers from several security treats such as desynchronization attack. Following RAPP, several protocols have been proposed in literature to defeat such attacks. Among them, some protocols suggested to keep a record of old parameters by both the reader and the tag. In this...

Journal: :JNW 2015
Zhicai Shi Fei Wu Yongxiang Xia Yihan Wang Jian Dai Changzhi Wang

RFID is a key technology that can be used to create the pervasive society. The tag is an important part of the RFID system and most popular tags are some low-cost passive tags. These tags have limited computing and storing resources, and no more attentions are paid to their security and privacy. So the application of these tags is not secure. Lightweight authentication protocols are considered ...

2013
Yingjiu Li Robert H. Deng Elisa Bertino

 Our major contribution in this field is to clarify the differences between two RFID privacy notions: one based on the indistinguishability of two tags (denoted as ind-privacy), and the other based on the unpredictability of the output of a protocol (denoted as unp-privacy). It is proven that ind-privacy is weaker than unp-privacy. Moreover, the minimal (necessary and sufficient) condition on ...

2011
G. Varun Reddy Srujan Raju

Epcglobal class-1 generation-2 has been approved by the ISO18000-6C for the global usage. Here the tag can be traceable and that is transmitted into the plain text . In traditional encryption methods we use symmetric or asymmetric ciphers but this encryption methods are not suitable for the RFID tags. Gen2 has proposed some lightweight authentication protocols. Here message flow in RFID tag is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید