2006
DOI: 10.1007/11915034_59
|View full text |Cite
|
Sign up to set email alerts
|

EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
152
0
1

Year Published

2008
2008
2018
2018

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 201 publications
(153 citation statements)
references
References 8 publications
0
152
0
1
Order By: Relevance
“…First, assume two parties are synchronized in the state S (1) . To resist possible desynchronization attacks, the reader keeps also the previous state S (0) .…”
Section: A Attack Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…First, assume two parties are synchronized in the state S (1) . To resist possible desynchronization attacks, the reader keeps also the previous state S (0) .…”
Section: A Attack Descriptionmentioning
confidence: 99%
“…To resist possible desynchronization attacks, the reader keeps also the previous state S (0) . The aim of the attacker is to force the tag to update its state to, say S (2 ′ ) while the reader has updated its state to S (2) and keeping S (1) as its old state. The attack is outlined as follows:…”
Section: A Attack Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Several families of protocols have been proposed, such as the influential HB family (see [2] for a thorough presentation of the HB family), and other "human authentication" protocols. In [4], Peris-Lopez, Hernandez-Castro, Estevez-Tapiador, and Ribagorda introduced a mutual protocol, called LMAP, which is the first of what came to be known as the "ultralightweight protocols family". Many proposals followed (see [1] for a comprehensive introduction to this protocol family), but almost all of them have been broken.…”
Section: Introductionmentioning
confidence: 99%
“…The HB-family(HB + ,HB ++ , HB*,etc.) [1,2,3,4,5,7,6,8] and the MAPfamily(LMAP,EMAP,M2AP,etc) [9,10,11] authentication protocols, are some examples of this kind. However, proposed lightweight protocols so far have been targeted to various successful attacks and therefore, the search for a concrete lightweight solution for authentication in low-cost RFID tags still continues.…”
Section: Introductionmentioning
confidence: 99%