2009 IEEE International Conference on RFID 2009
DOI: 10.1109/rfid.2009.4911179
|View full text |Cite
|
Sign up to set email alerts
|

Untraceable RFID authentication protocols: Revision of EC-RAC

Abstract: Abstract-Radio Frequency IDentification (RFID) systems are steadily becoming paramount due to their vast applications such as supply chains, inventory, tolling, baggage management, access control etc. While they have potentials to improve our lives, they also present a privacy risk. Privacy is often overlooked in many applications, but due to pervasiveness of RFIDs the issue has to be taken into account. However, additional security always comes at price and the scarceness of resources on a tag makes conventio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Oren and Feldhofer [39] and Saarinen [42] respectively used randomized Rabin encryption in protocol design. There are also some other authentication protocols [12,30,31,29] based on public-key cryptography, but they are later found insecure in [8,17,35].…”
Section: Related Workmentioning
confidence: 99%
“…Oren and Feldhofer [39] and Saarinen [42] respectively used randomized Rabin encryption in protocol design. There are also some other authentication protocols [12,30,31,29] based on public-key cryptography, but they are later found insecure in [8,17,35].…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, Bringer et al (2008) and pointed out that Lee et al's scheme cannot survive the replay attack and tracking attack. In order to improve security, Lee et al (2009) proposed another ECC-based RFID authentication scheme. However, Liao and Hsiao (2013) proposed an ECC based RFID authentication scheme integrated with an ID verifier transfer protocol and claimed their scheme could survive various attacks.…”
Section: Related Workmentioning
confidence: 99%