نتایج جستجو برای: rfid authentication protocol

تعداد نتایج: 283411  

Journal: :IACR Cryptology ePrint Archive 2011
Gildas Avoine Xavier Carpent

Eghdamian and Samsudin published at ICIEIS 2011 an ultralightweight mutual authentication protocol that requires few bitwise operations. The simplicity of the design makes the protocol very suitable to low-cost RFID tags. However, we demonstrate in this paper that the long-term key shared by the reader and the tag can be recovered by an adversary with a few eavesdropped sessions only.

2017
Yassine NAIJA Vincent BEROULLE Mohsen MACHHOUT

Radio Frequency Identification (RFID) technology is widely spread in many security applications. Producing secured low-cost and low-power RFID tags is a challenge. The used of lightweight encryption algorithms can be an economic solution for these RFID security applications. This article proposes low cost countermeasure to secure RFID tags against Electromagnetic Side Channel Attacks (EMA). Fir...

Journal: :CoRR 2009
Tzipora Halevi Nitesh Saxena Shai Halevi

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlyi...

Journal: :Journal of the Institute of Electronics and Information Engineers 2013

Journal: :International Journal of Security and Its Applications 2014

Journal: :International Journal of Computer Applications 2011

Journal: :Computer Communications 2011
Dang Nguyen Duc Kwangjo Kim

In this paper, we present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, we point out that in the O-FRAP protocol, the server can be subject to a denial-of-service attack due to a flaw in the database querying procedure. Our attack also applies to ...

Journal: :The Journal of Korean Institute of Communications and Information Sciences 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید