2008 14th IEEE International Conference on Parallel and Distributed Systems 2008
DOI: 10.1109/icpads.2008.46
|View full text |Cite
|
Sign up to set email alerts
|

Secure RFID Identification and Authentication with Triggered Hash Chain Variants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…For instance, the protocol proposed by Henrici et al maintains a session number to synchronize the tag and the reader which can be easily manipulated by a malicious attacker by interrogating the tag in a middle step of the authentication process, and thus desynchronizing the tag and the reader [49]. In Lim et al's protocol, total number of authentication session requests are limited which makes it vulnerable to denial-of-service (DoS) attacks [58]. In the protocol proposed by Tan et al, the tag returns a static form of data based on its ID and a secret which can be utilized to track the tag by any adversaries.…”
Section: Low-resource Communication and Computationmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, the protocol proposed by Henrici et al maintains a session number to synchronize the tag and the reader which can be easily manipulated by a malicious attacker by interrogating the tag in a middle step of the authentication process, and thus desynchronizing the tag and the reader [49]. In Lim et al's protocol, total number of authentication session requests are limited which makes it vulnerable to denial-of-service (DoS) attacks [58]. In the protocol proposed by Tan et al, the tag returns a static form of data based on its ID and a secret which can be utilized to track the tag by any adversaries.…”
Section: Low-resource Communication and Computationmentioning
confidence: 99%
“…Most RFID researchers believe that the industry requires simple and low cost RFID tags with limited number of logic gates which reduces the cryptographic capability of such devices [20,51]. Several light-weight RFID protocols have been proposed and [32,49,54,58,82,83,88] are just to name a few. Most of these protocols utilize cryptographic hash functions, random number generators, and XOR functions which are light-weight solutions compared to other computationally expensive symmetric key and public key cryptographic primitives.…”
Section: Low-resource Communication and Computationmentioning
confidence: 99%
See 1 more Smart Citation
“…Most researchers believe that to replace namely the barcodes by RFID the industry needs simple and low cost RFID tags (below 5 cents per item) which puts a restriction on the number of logical gates [8,9]. For this case, many approaches that are based on the lightweight cryptographic solutions and protocols have been suggested [10][11][12][13][14][15]. On the other hand, Some RFID researchers, however, believe that it would be possible to use complex cryptographic primitives in future RFID tags.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, lightweight protocols have been of interest to both industry and academia and design of secure authentication protocols for low-cost RFID tags has received the attention of a lot of researchers, though many protocols have been published lately [5,6,[10][11][12][13][14]19,20]. However, most of them have not satisfied the claimed security goals [21][22][23][24][25][26][27][28].…”
Section: Introductionmentioning
confidence: 99%