2012 Fourth International EURASIP Workshop on RFID Technology 2012
DOI: 10.1109/rfid.2012.19
|View full text |Cite
|
Sign up to set email alerts
|

A Toolbox for RFID Protocol Analysis

Abstract: -Many RFID tags and contactless smart cards use proprietary security mechanisms for authentication and confidentiality. There are several examples in the literature showing that once these mechanisms have been reverse engineered, their security turns out to be unsatisfactory. Since the use of these tags is quickly expanding to access control and ticketing systems, it is important to independently assess their security. In this paper, we propose three tools for the analysis of RFID protocols. These tools facili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 30 publications
0
7
0
1
Order By: Relevance
“…Although RFID reader-to-reader collisions are a relevant problem, an established method for the analysis and evaluation of reader-to-reader anti-collision protocols does not exist (e.g., [21,22]). The characteristics of the employed interference model are particularly relevant.…”
Section: Introductionmentioning
confidence: 99%
“…Although RFID reader-to-reader collisions are a relevant problem, an established method for the analysis and evaluation of reader-to-reader anti-collision protocols does not exist (e.g., [21,22]). The characteristics of the employed interference model are particularly relevant.…”
Section: Introductionmentioning
confidence: 99%
“…Salah satu layanan Confidentiality adalah dengan menerapkan enkripsi. Enkripsi merupakan sebuah teknik untuk mengubah file/data/informasi dari bentuk yang dapat dimengerti (plaintext) menjadi bentuk yang tidak dapat dimengerti (ciphertext) [6] | 169 mengenaultehnik untuk menemukan atau mengembalikan kunci rahasia disebut dengan cryptanalysis [7].…”
Section: Confidentialityunclassified
“…Such tokens may be emulated by a suitable hardware, either by running a software on a micro-controller which mimics the identity token behavior, or by designing a copy of the identity token and intentionally removing the limitations enforced by the original identity token's manufacturer. Originally, the emulation of identity tokens was limited to laboratory conditions [10] or specialized hardware [21,11] which required an experienced user and often hardcoding the ID in the source code. However, in recent years the alternatives to genuine tokens emerged, which are easy to use and do not require any prior user knowledge.…”
Section: Identity Token Cloning Using Commercially Available Tagsmentioning
confidence: 99%