2013
DOI: 10.4304/jcp.8.3.605-612
|View full text |Cite
|
Sign up to set email alerts
|

Security Protocol for RFID System Conforming to EPC-C1G2 Standard

Abstract: Last few years, many security schemes are designed for RFID system since the release of the EPC Class 1 Generation 2 standard. In 2010, Yeh et al. proposed a new RFID authentication protocol conforming to EPC Class 1 Generation 2 standard. Yoon pointed that their protocol still had two serious security problems such as DATA integrity problem and forward secrecy problem. Then he proposed an improved protocol which claimed to eliminate the weakness in 2011. This paper shows that Yoon' s protocol had no resistanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…347 lot of personal privacy information, once be disclosed, it will lead to the disclosure of user's interests, habits, health status, political affiliation and other personal privacy information [8]. For example, if a user frequently visits hospitals or clinics in a certain period of time, the attacker can deduce that he is likely to suffer a disease.…”
Section: Location-based Services and Privacy Protection Under Mobile mentioning
confidence: 99%
“…347 lot of personal privacy information, once be disclosed, it will lead to the disclosure of user's interests, habits, health status, political affiliation and other personal privacy information [8]. For example, if a user frequently visits hospitals or clinics in a certain period of time, the attacker can deduce that he is likely to suffer a disease.…”
Section: Location-based Services and Privacy Protection Under Mobile mentioning
confidence: 99%
“…If a malicious attacker intercepted the LBS service request, and finally obtained the original location information by calculating or reasoning their position information, that will result in serious threat on personal security and vital interests. As the physical location and trajectory data of mobile user contains a 347 lot of personal privacy information, once be disclosed, it will lead to the disclosure of user's interests, habits, health status, political affiliation and other personal privacy information [8]. For example, if a user frequently visits hospitals or clinics in a certain period of time, the attacker can deduce that he is likely to suffer a disease.…”
Section: Privacy Protection Of Lbs Systemmentioning
confidence: 99%
“…doi:10.12720/jcm. 8.5.282-287 HEMTs and simulate some characteristics which are related to device performance [3]- [5].…”
Section: Introductionmentioning
confidence: 99%