نتایج جستجو برای: rfid authentication protocol

تعداد نتایج: 283411  

Journal: :I. J. Network Security 2015
Noureddine Chikouche Cherif Foudil Pierre-Louis Cayrel Mohamed Benmohammed

Among the embedded systems which were quickly developed during the last years and that were used in various domains (e.g. access control, health, ...) we can cite radio frequency identification (RFID). In this paper, we propose an improved mutual authentication protocol in RFID systems based on the randomized McEliece cryptosystem. The McEliece cryptosystem is not only very fast, but it is resi...

Journal: :JDIM 2013
Dong Sun Dan Liu

During recent years,RFID technology has a wide applications in many fields.Since singnal transmit by the radio frequency, it raises many security and privacy concerns. Ownership transfer of RFID tags is another requriement for RFID systems. During the life of tag, it may pass from manufacutrer to commercial agent, the ownership of tag need change correspondingly.Taking into account the natural ...

Journal: :J. Inf. Sci. Eng. 2009
Pedro Peris-Lopez Julio César Hernández Castro Juan E. Tapiador Arturo Ribagorda

Low-cost Radio Frequency Identification (RFID) tags are devices with very limited computational capability, in which only 250-4K logic gates can be devoted to securityrelated tasks. Classical cryptographic primitives such as block ciphers or hash functions are well beyond the computational capabilities of low-cost RFID tags, as ratified by the EPCglobal Class-1 Gen-2 RFID specification. Moreove...

2010
Gildas Avoine Xavier Carpent Benjamin Martin

In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming probability the secret ID of the prover by eavesdropping about 2 authentications. The result dismantles SASI and, more generally, provides a new approach that threatens ultra-lightweight authentication protocols.

Journal: :IACR Cryptology ePrint Archive 2012
Cristina Onete

Distance-bounding protocols address man-in-the-middle (MITM) in authentication protocols: by measuring response times, verifiers ensure that the responses are not purely relayed. Dürholz et al. [13] formalize the following attacks against distancebounding protocols: (1) mafia fraud, where adversaries must authenticate to the verifier in the presence of honest provers; (2) terrorist fraud, where...

2012
Jung-Hui Chiu

This research study and analyse the various attacks RFID card on Mifare's disadvantage and safety concerns crux of the problem. The key recovery attack method depends on a plaintext-ciphertext pair on the existing relationship, as well as the secret parameters of the pseudo random number for use of the timing inappropriate. We proposed a scheme to improve the mechanisms for authentication, no a...

Journal: :IACR Cryptology ePrint Archive 2010
Tzu-Chang Yeh Yanjun Wang Tsai-Chi Kuo Sheng-Shih Wang

Radio Frequency IDentification (RFID) technology is a wireless identification method in which security and privacy are important parameters for public acceptance and widespread use. In order to thwart such security and privacy problems, a wide variety of authentication protocols have been proposed in the literature. In 2010, Yeh et al’s proposed a new RFID authentication protocol conforming to ...

Journal: :IACR Cryptology ePrint Archive 2012
Shao-hui Wang Sujuan Liu Dan-wei Chen

Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary can not trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, we analyze two recently proposed RFID authentication schemes: Randomized GPS and Randomized Hashed GP...

Journal: :JCP 2013
Xueping Ren Xianghua Xu Yunfa Li

With the widespread development of RFID technology, security and privacy issues become more prominent in RFID applications. In this paper, a new oneway hash function based mutual authentication protocol is proposed to address such security and privacy problems. Particularly, access list and pseudorandom flags are adopted for quick search, to ensure good efficiency and scalability. The proposed ...

2006
Daesung Kwon Daewan Han Jooyoung Lee Yongjin Yeom

In this paper, we analyze the security of the RFID authentication protocol proposed by Choi et al. at SecUbiq 2005. They claimed that their protocol is secure against all possible threats considered in RFID systems. However, we show that the protocol is vulnerable to an impersonation attack. Moreover, an attacker is able to trace a tag by querying it twice, given the initial information from 2d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید