RFID security and privacy: A research survey

A Juels - IEEE journal on selected areas in communications, 2006 - ieeexplore.ieee.org
This paper surveys recent technical research on the problems of privacy and security for
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …

SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity

HY Chien - IEEE transactions on dependable and secure …, 2007 - ieeexplore.ieee.org
As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight
RFID authentication protocols to resist all possible attacks and threats. However, all of the …

Defining strong privacy for RFID

A Juels, SA Weis - ACM Transactions on Information and System …, 2009 - dl.acm.org
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our
contribution is twofold:(i) We propose a simple, formal definition of strong privacy useful for …

On privacy models for RFID

S Vaudenay - International conference on the theory and application …, 2007 - Springer
We provide a formal model for identification schemes. Under this model, we give strong
definitions for security and privacy. Our model captures the notion of a powerful adversary …

Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards

HY Chien, CH Chen - Computer Standards & Interfaces, 2007 - Elsevier
As low-cost Radio Frequency Identification (RFID) will become pervasive in our daily lives,
RFID systems may create new threats to the security and privacy of individuals and …

RFID authentication protocol for low-cost tags

B Song, CJ Mitchell - Proceedings of the first ACM conference on …, 2008 - dl.acm.org
In this paper, we investigate the possible privacy and security threats to RFID systems, and
consider whether previously proposed RFID protocols address these threats. We then …

[PDF][PDF] Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning

DN Duc, J Park, H Lee, K Kim - SCIS 2006, 2006 - koasas.kaist.ac.kr
In this paper, we present a synchronization-based communication protocol for RFID devices.
We focus on the EPCGlobal Class-1 Gen-2 RFID tag which supports only simple …

An efficient and secure RFID security method with ownership transfer

K Osaka, T Takagi, K Yamazaki… - 2006 International …, 2006 - ieeexplore.ieee.org
Radio frequency identification (RFID) has come under the spotlight as technology
supporting ubiquitous society. But now, we face several security problems and challenges in …

A privacy preserving framework for RFID based healthcare systems

F Rahman, MZA Bhuiyan, SI Ahamed - Future generation computer …, 2017 - Elsevier
Abstract RFID (Radio Frequency IDentification) is anticipated to be a core technology that
will be used in many practical applications of our life in near future. It has received …

Analysing unlinkability and anonymity using the applied pi calculus

M Arapinis, T Chothia, E Ritter… - 2010 23rd IEEE computer …, 2010 - ieeexplore.ieee.org
An attacker that can identify messages as coming from the same source, can use this
information to build up a picture of targets' behaviour, and so, threaten their privacy. In …