2011 8th International ISC Conference on Information Security and Cryptology 2011
DOI: 10.1109/iscisc.2011.6062337
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Many RFID authentication protocols have been proposed until now [14,15,16,17,18,19,20,21,22,23,24]. Although mentioned protocols have wanted to provide secure and untraceable communication for RFID systems; many weaknesses have been found in them [25,26,27,28,29,30,31,32,33,34,35,36,37,38].However, Yeh et al [1] have recently proposed a RFID mutual authentication protocol compatible with EPC C-1 G-2 standard that we name SRP (Securing RFID Protocol) in this paper. The authors have claimed that not only does not reveal SRP any information but also it has forward secrecy characteristic.…”
Section: Introductionmentioning
confidence: 99%
“…Many RFID authentication protocols have been proposed until now [14,15,16,17,18,19,20,21,22,23,24]. Although mentioned protocols have wanted to provide secure and untraceable communication for RFID systems; many weaknesses have been found in them [25,26,27,28,29,30,31,32,33,34,35,36,37,38].However, Yeh et al [1] have recently proposed a RFID mutual authentication protocol compatible with EPC C-1 G-2 standard that we name SRP (Securing RFID Protocol) in this paper. The authors have claimed that not only does not reveal SRP any information but also it has forward secrecy characteristic.…”
Section: Introductionmentioning
confidence: 99%
“…• Desynchronization: This is an active attack in which a malicious adversary tries to cause the tag and the reader to update inconsistent values and make tag disabled [11]. In recent years, many researchers have tried to propose lightweight and secure authentication protocols [12,13,14,15,16,17,18,19,20,21,22,23,24], but unfortunately many vulnerabilities have been found in their schemes [25,26,27,28,29,30,31,32,33,34,35,36,37,38]. Recently Fu et al [39] proposed a scalable RFID mutual authentication and Li et al [40] suggested a mutual authentication protocol for RFID communication.…”
Section: Introductionmentioning
confidence: 99%