نتایج جستجو برای: traceability attack

تعداد نتایج: 86939  

2010
Julio César Hernández Castro Pedro Peris-Lopez Raphael C.-W. Phan Juan E. Tapiador

In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for low-cost RFID tags. In this paper, we present a quite powerful cryptanalytic attack against their proposal: we start with a traceability attack, then describe how it can be extended to leak long-term stored secrets, and finally present a full disclosure attack (named...

Journal: :IACR Cryptology ePrint Archive 2012
Nasour Bagheri Masoumeh Safkhani Pedro Peris-Lopez Juan E. Tapiador

Tian et al. proposed a novel ultralightweight RFID mutual authentication protocol [4] that has recently been analyzed in [1], [2], [5]. In this letter, we first propose a desynchronization attack that succeeds with probability almost 1, which improves upon the 0.25 given by the attack in [1]. We also show that the bad properties of the proposed permutation function can be exploited to disclose ...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Majid Naderi

Recently Chen et al. have proposed a RFID access control protocol based on the strategy of indefinite-index and challenge-response. They have claimed that their protocol provides optimal location privacy and resists against man in the middle, spoofed tag and spoofed reader attacks. However, in this paper we show that Chen et al. protocol does not provide the claimed security. More precisely, we...

Journal: :IACR Cryptology ePrint Archive 2013
Masoumeh Safkhani Nasour Bagheri

In this paper we present new constraints to EPCglobal Class 1 Generation 2 (EPCC1 G2) standard which if they have been considered in the design of EPC-C1 G2 complaint authentication protocols, lead to prevent predecessor’s protocols’ weaknesses and also present the secure ones. Also in this paper as an example, we use Pang et al. EPC-C1 G2-friendly protocol which has been recently proposed, to ...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Somitra Kumar Sanadhya Majid Naderi

EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this standard, several protocols have been proposed compliant to this standard. In this paper we analyze the improved Yeh et al. ’s protocol by Yoon which is conforming to EPC-C1 G2 standard and is one ...

Journal: :J. Computational Applied Mathematics 2011
Masoumeh Safkhani Nasour Bagheri Ali Mahani

Recently Qian et al. [38] have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags’ private information. They have stated that most of the existing RFID mutual authentication protocols are vulnerable to this attack. To defend against counting attack, they propose a novel Anti-Counting Sec...

Journal: :مدیریت صنعتی 0
جعفر رزمی دانشکده¬های فنی، دانشگاه تهران، ایران رضا توکلی مقدم پردیس دانشکده¬های فنی، دانشگاه تهران، ایران فریبرز جولای پردیس دانشکده¬های فنی، دانشگاه تهران، ایران بابک یاری پردیس دانشکده¬های فنی، دانشگاه تهران، ایران

traceability is a basic requirement for the most of products from the viewpoint of governments and customers. it has base of quality systems and supports integration of supply chain information systems. this paper has presented a holistic model for supply chain traceability through structural equation modeling. this model will support recall of products, quality assurance requirements, improve ...

2005
Richard Clayton

Traceability is the ability to map events in cyberspace, particularly on the Internet, back to real-world instigators, often with a view to holding them accountable for their actions. Anonymity is present when traceability fails. I examine how traceability on the Internet actually works, looking first at a classical approach from the late 1990s that emphasises the rôle of activity logging and r...

Journal: :IACR Cryptology ePrint Archive 2017
Seyed Farhad Aghili Hamid Mala

Design of ultra-lightweight authentication protocols for RFID systems conformed with the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security. Recently, Maurya et al. have proposed a CRC based authentication protocol and claimed that their protocol can resist against all known attacks in RFID systems. However, in this paper we show that their protocol is vulnerable to...

2015
Hesham A. El Zouka Mustafa M. Hosni

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks which limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceabil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید