2015 IEEE International Conference on RFID Technology and Applications (RFID-TA) 2015
DOI: 10.1109/rfid-ta.2015.7379806
|View full text |Cite
|
Sign up to set email alerts
|

A secure minimalist RFID authentication and an ownership transfer protocol compliant to EPC C1G2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Lin et al's [14] has inefficient authentication procedure. The protocol proposed by S. Edelev et al [15] is still vulnerable to certain security and privacy attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Lin et al's [14] has inefficient authentication procedure. The protocol proposed by S. Edelev et al [15] is still vulnerable to certain security and privacy attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Taheri and Dieter Hogrefe [16] proposed a minimalist RFID Authentication protocol with ownership transfer stage compliant to the EPC C1G2 based on Quadratic residues. Through the detailed security and privacy analyses, they proved the possibility of their protocol to solve the vulnerabilities in privacy and security in which other protocols can fail to deal with.…”
Section: Finally In 2015 Sviatoslav Edelev Somayehmentioning
confidence: 99%
“…When the management decides it is time to modify the production procedure or rearrange the product circulation process, an ownership transfer scheme can have the job done without wasting tag or human resources because no new tags are needed to replace the old ones. So far, quite a number of ownership transfer schemes have been proposed (Chien 2015;Dimitriou 2016;Doss et al 2013b;Edelev et al 2015;Kapoor and Piramuthu 2012;Munilla et al 2013;Munilla et al 2016;Niu et al 2016;Ray et al 2017). Chen et al (Chen and Chien 2013) presented a RFID ownership transfer scheme that was EPC Class-1 Gen-2 standard (EPC Gen2) compliant; however, Li et al (Li et al 2015) pointed out that Chen et al's scheme had some security weaknesses including vulnerability to the denial of service attack (DoS) and failure to keep forward and backward secrecy.…”
Section: Introductionmentioning
confidence: 99%