2008
DOI: 10.1007/s11277-008-9597-8
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Your Privacy with a Mobile Agent Device in RFID Environment

Abstract: Radio Frequency Identification (RFID) Technology is a contactless automatic identification technology using radio frequency. For this RFID technology to be widely spread, the problem of privacy invasion should be solved. There are many research works in progress to solve the RFID privacy problems. Most of works for solving this problem have focused on developing light-weight cryptographic modules which can be embedded into RFID tags, but some of them used a proxy agent approach that control communications 123 … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
4
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 18 publications
1
4
0
Order By: Relevance
“…In fact, the more reasonable assumption should be that there is an insecure channel between the Reader and Tag. Yeo et al (2009) proposed an assumption close to the similar relative facts. Different from Song and Mitchell (2008) and Rizomiliotis et al (2009)…”
Section: Related Researchsupporting
confidence: 53%
“…In fact, the more reasonable assumption should be that there is an insecure channel between the Reader and Tag. Yeo et al (2009) proposed an assumption close to the similar relative facts. Different from Song and Mitchell (2008) and Rizomiliotis et al (2009)…”
Section: Related Researchsupporting
confidence: 53%
“…Hence, a more reasonable assumption is to assume that the channel is insecure between the reader and the server. Yeo et al (2009) has made a similar assumption compared with ours, but with a different environment than that of Song-Mitchell's and Rizomiliotis et al's protocol. Yeo et al's research was based on the mobile agent in RFID environment.…”
Section: Introductionmentioning
confidence: 59%
“…In eMARP-based RFID system [20], the security analysis indicated that the proposed protocol was unable to resist a location tracking. The attacker is capable of recognizing and tracing from a particular message to the target tag.…”
Section: Weakness Of Emarp Based Rfid Systemmentioning
confidence: 99%
“…The mobile agent device guarantees higher level security than any other protection protocol. Later, Yeo et al [20] proposed eMARP-based RFID system and then improved the security flaws of MARP. However, we pointed out and proved that eMARP-based RFID system cannot resist location tracking as they claim.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation