RFID security and privacy: A research survey
A Juels - IEEE journal on selected areas in communications, 2006 - ieeexplore.ieee.org
This paper surveys recent technical research on the problems of privacy and security for
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
HY Chien - IEEE transactions on dependable and secure …, 2007 - ieeexplore.ieee.org
As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight
RFID authentication protocols to resist all possible attacks and threats. However, all of the …
RFID authentication protocols to resist all possible attacks and threats. However, all of the …
Defining strong privacy for RFID
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our
contribution is twofold:(i) We propose a simple, formal definition of strong privacy useful for …
contribution is twofold:(i) We propose a simple, formal definition of strong privacy useful for …
On privacy models for RFID
S Vaudenay - International conference on the theory and application …, 2007 - Springer
We provide a formal model for identification schemes. Under this model, we give strong
definitions for security and privacy. Our model captures the notion of a powerful adversary …
definitions for security and privacy. Our model captures the notion of a powerful adversary …
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
HY Chien, CH Chen - Computer Standards & Interfaces, 2007 - Elsevier
As low-cost Radio Frequency Identification (RFID) will become pervasive in our daily lives,
RFID systems may create new threats to the security and privacy of individuals and …
RFID systems may create new threats to the security and privacy of individuals and …
RFID authentication protocol for low-cost tags
B Song, CJ Mitchell - Proceedings of the first ACM conference on …, 2008 - dl.acm.org
In this paper, we investigate the possible privacy and security threats to RFID systems, and
consider whether previously proposed RFID protocols address these threats. We then …
consider whether previously proposed RFID protocols address these threats. We then …
[PDF][PDF] Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
In this paper, we present a synchronization-based communication protocol for RFID devices.
We focus on the EPCGlobal Class-1 Gen-2 RFID tag which supports only simple …
We focus on the EPCGlobal Class-1 Gen-2 RFID tag which supports only simple …
An efficient and secure RFID security method with ownership transfer
K Osaka, T Takagi, K Yamazaki… - 2006 International …, 2006 - ieeexplore.ieee.org
Radio frequency identification (RFID) has come under the spotlight as technology
supporting ubiquitous society. But now, we face several security problems and challenges in …
supporting ubiquitous society. But now, we face several security problems and challenges in …
A privacy preserving framework for RFID based healthcare systems
Abstract RFID (Radio Frequency IDentification) is anticipated to be a core technology that
will be used in many practical applications of our life in near future. It has received …
will be used in many practical applications of our life in near future. It has received …
Analysing unlinkability and anonymity using the applied pi calculus
An attacker that can identify messages as coming from the same source, can use this
information to build up a picture of targets' behaviour, and so, threaten their privacy. In …
information to build up a picture of targets' behaviour, and so, threaten their privacy. In …