2006 International Conference on Hybrid Information Technology 2006
DOI: 10.1109/ichit.2006.253688
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security

Abstract: RFID tag carries vital information in their operation and thus concerns on privacy and security issues do arise. The problem of traceability is critical in open radio frequency environments. An adversary can trace and interact with tag and this is referred as tracking.Nevertheless, with a strong authentication mechanism, uprising security problems in RFID systems can be solved. We had demonstrated current vulnerabilities and proposed our authentication mechanism to overcome them. As long as the secret informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Although the above mentioned techniques are developed such that the key remains unexposed during wireless transmission, there are other possible attacks that may arise leading to a compromise in authentication. For example Kim et al and others analyze the importance of protecting the tag identifier (ID) [13]. This value is typically encoded by a manufacturer and it is embedded in the tag's memory.…”
Section: Authentication For Location Privacy and Forward-securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Although the above mentioned techniques are developed such that the key remains unexposed during wireless transmission, there are other possible attacks that may arise leading to a compromise in authentication. For example Kim et al and others analyze the importance of protecting the tag identifier (ID) [13]. This value is typically encoded by a manufacturer and it is embedded in the tag's memory.…”
Section: Authentication For Location Privacy and Forward-securitymentioning
confidence: 99%
“…forth recently [ 13]. The main assumptions of this work are that the tag possesses an ID that is unique, a secret key (key) and has an encryption function (E).…”
Section: Authentication For Location Privacy and Forward-securitymentioning
confidence: 99%
“…Consumers are most afraid of being tracked without their consent or knowledge by RFID tags that are ubiquitously hidden in clothing and other consumer items (Ayoade, 2007). The privacy threats in RFID systems can be categorized into two classes: data privacy and location privacy (Oertel et al, 2005;Kim et al, 2006). The threats to data privacy involve discovering personal information stored on the tag and/or in the associated database, while the threats to location privacy comprise the information about a person's current location and past movement through a tag ID associated with that person (Langheinrich, 2007a).…”
mentioning
confidence: 99%