2013
DOI: 10.7840/kics.2013.38c.1.12
|View full text |Cite
|
Sign up to set email alerts
|

Improved Authentication Protocol for Privacy Protection in RFID Systems

Abstract: identification and to generates variable data in every session. He argued that the DAP3-RS is safe from spoofing attack, replay attack, traffic analysis and etc. Also, the DAP3-RS resolved problem by fixed metaID of Hash-Lock protocol using AES algorithm. However, unlike his argue, attacker can pass authentication and traffic analysis using by same data and fixed hash value on the wireless. We proposed authentication protocol based on AES algorithm. Also, our protocol is secure and efficient in comparison with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Readers and tags only perform the symmetric key encryption and the XOR operation to generate a random value for mutual authentication, and thus the protocol is energy efficient. However, the protocol may easily be exposed to an attacker because all the readers and tags have the encryption and decryption key that are not updated [10]. To solve this problem, another system has been proposed, wherein a dynamic ID changed in each communication session is used and only the symmetric key encryption and the XOR operation are used by considering the limited resources of tags.…”
Section: Related Workmentioning
confidence: 99%
“…Readers and tags only perform the symmetric key encryption and the XOR operation to generate a random value for mutual authentication, and thus the protocol is energy efficient. However, the protocol may easily be exposed to an attacker because all the readers and tags have the encryption and decryption key that are not updated [10]. To solve this problem, another system has been proposed, wherein a dynamic ID changed in each communication session is used and only the symmetric key encryption and the XOR operation are used by considering the limited resources of tags.…”
Section: Related Workmentioning
confidence: 99%