Proceedings of the Fifth International Conference on Network, Communication and Computing 2016
DOI: 10.1145/3033288.3033292
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Dimitriou's Key Evolving RFID Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In this section, we shall prove that the proposed scheme satisfies all important security requirements, and the security protection is strong enough against all possible attacks. To decide on our lists of security requirements and possible attacks, we referred to some well-established studies on RFID authentication as well as ownership transfer (Alamr et al 2016;Kapoor and Piramuthu 2012;Lee et al 2016;Lien et al 2012;Lin et al 2015;Mujahid et al 2016). Table 4 shows a security comparison among several related schemes (Cao et al 2016;Chien 2015;Cong et al 2014;Lee et al 2016;Munilla et al 2013;Munilla et al 2016;Ray et al 2017).…”
Section: Security Analysismentioning
confidence: 99%
“…In this section, we shall prove that the proposed scheme satisfies all important security requirements, and the security protection is strong enough against all possible attacks. To decide on our lists of security requirements and possible attacks, we referred to some well-established studies on RFID authentication as well as ownership transfer (Alamr et al 2016;Kapoor and Piramuthu 2012;Lee et al 2016;Lien et al 2012;Lin et al 2015;Mujahid et al 2016). Table 4 shows a security comparison among several related schemes (Cao et al 2016;Chien 2015;Cong et al 2014;Lee et al 2016;Munilla et al 2013;Munilla et al 2016;Ray et al 2017).…”
Section: Security Analysismentioning
confidence: 99%
“…Hence, Yoon et al [13], Chen et al [14], Yang et al [15], and Dimitriou et al [16] proposed new ownership transfer methods to address the asynchronous service problem and ensure the forward secrecy of ownership transfer. However, the protocol presented by Dimitriou et al [16] is vulnerable to counterfeiting and replay attacks [17]. The methods developed by Yoon et al [13] and Chen et al [14] are also associated with security concerns such as lack of support for backward secrecy, the inability to ensure location privacy, and windowing problems [9,18].…”
Section: Introductionmentioning
confidence: 99%