2009 6th International Symposium on Wireless Communication Systems 2009
DOI: 10.1109/iswcs.2009.5285367
|View full text |Cite
|
Sign up to set email alerts
|

A secure and efficient authentication protocol for passive RFID tags

Abstract: Abstract-At the onset of the ubiquitous computing era, systems need to respond to a variety of challenges, in order to capitalize on the benefits of pervasiveness. One of the pivotal enablers of pervasive computing is the RFID technology which can be successfully applied in numerous applications. However, the interaction of such applications with sensitive personal data renders the need for assuring confidentiality a sine qua non. The native limitations in computing resources, i.e., computational power, memory… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…Chien and Chen [7] proposed a mutual authentication scheme appropriate for low cost tags, but it cannot resist denial of service (DoS) attacks if the synchronisation between the tag and reader is lost. Kolias et al [8] improved the protocol [7] by enabling readers and tags to communicate securely and by providing resistance against DoS attack. Ding et al [9] proposed a method which shares a key from key array to resolve the internal attacks issue, but they do not provide a proof for correctness.…”
Section: Introductionmentioning
confidence: 99%
“…Chien and Chen [7] proposed a mutual authentication scheme appropriate for low cost tags, but it cannot resist denial of service (DoS) attacks if the synchronisation between the tag and reader is lost. Kolias et al [8] improved the protocol [7] by enabling readers and tags to communicate securely and by providing resistance against DoS attack. Ding et al [9] proposed a method which shares a key from key array to resolve the internal attacks issue, but they do not provide a proof for correctness.…”
Section: Introductionmentioning
confidence: 99%