2014
DOI: 10.12785/amis/080450
|View full text |Cite
|
Sign up to set email alerts
|

A New Scalable RFID Delegation Protocol

Abstract: Abstract:The radio frequency identification (RFID) protocols are vulnerable to various attacks from an active or passive adversary. We shed light upon some existing security flaws in these delegation protocols. It is useful to mitigate many security weaknesses in such delegation protocols to promote the acceptance of RFID tags. We propose that a scalable RFID delegation protocol will be against traceability attacks with a stateful variant so that it provides the claimed security requirements. Compared with the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Then, s/he sends ( hello, 0 ) to T*, and monitors the outputs (*x'', *t''). We can obtain the following equation (*x'' ⊕ *t'')=( h(TID) ⊕r) 4 mod n. Therefore, the computed value (*x''⊕*t'') should be fixed owing to the fixed keys h(TID), r and n for T*. 3) The decision phase:…”
Section: Cryptanalysis Of Doss Et Al's Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, s/he sends ( hello, 0 ) to T*, and monitors the outputs (*x'', *t''). We can obtain the following equation (*x'' ⊕ *t'')=( h(TID) ⊕r) 4 mod n. Therefore, the computed value (*x''⊕*t'') should be fixed owing to the fixed keys h(TID), r and n for T*. 3) The decision phase:…”
Section: Cryptanalysis Of Doss Et Al's Protocolmentioning
confidence: 99%
“…Among them, the security and the privacy of the entities (tag and owner) have played the important role. However, the later security analysis carried out on many schemes [4][5][6] have showed obvious weaknesses. This has motivated researchers improve the vulnerable schemes in order to protect against various attacks.…”
Section: Introductionmentioning
confidence: 99%