2008
DOI: 10.1109/twc.2008.061012
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Serverless RFID Authentication and Search Protocols

Abstract: With the increased popularity of RFID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
169
0
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 164 publications
(170 citation statements)
references
References 25 publications
0
169
0
1
Order By: Relevance
“…Cloning attacks in [1] is that an adversary can create a fake tag using an obtained response of a legitimate tag. However, our protocol uses a fresh random value in every session, using this fake tag, an adversary cannot pass the authentication.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cloning attacks in [1] is that an adversary can create a fake tag using an obtained response of a legitimate tag. However, our protocol uses a fresh random value in every session, using this fake tag, an adversary cannot pass the authentication.…”
Section: Discussionmentioning
confidence: 99%
“…There are five attacks to be considered in serverless search protocols, such as tracking, cloning, eavesdropping, physical, and DoS attacks (for the details, please refer to [1]). Besides security and privacy requirements in serverless search protocols, we should consider the privacy of mobile reader holders.…”
Section: Security and Privacy Requirements For Mobile Readersmentioning
confidence: 99%
“…Most RFID researchers believe that the industry requires simple and low cost RFID tags with limited number of logic gates which reduces the cryptographic capability of such devices [20,51]. Several light-weight RFID protocols have been proposed and [32,49,54,58,82,83,88] are just to name a few. Most of these protocols utilize cryptographic hash functions, random number generators, and XOR functions which are light-weight solutions compared to other computationally expensive symmetric key and public key cryptographic primitives.…”
Section: Low-resource Communication and Computationmentioning
confidence: 99%
“…In the protocol proposed by Tan et al, the tag returns a static form of data based on its ID and a secret which can be utilized to track the tag by any adversaries. These naive security flaws have kept the development of such protocols ongoing [83].…”
Section: Low-resource Communication and Computationmentioning
confidence: 99%
“…RFID searching (Tan et al, 2007(Tan et al, , 2008bWon et al, 2008;Lin et al, 2009;Hoque et al, 2010;Kim et al, 2011;Lee et al, 2012;Chun et al, 2011) is a special type of RFID authentication. In an RFID searching protocol, a reader only wants to authenticate a specified tag among all tags.…”
Section: Introductionmentioning
confidence: 99%