2011
DOI: 10.1016/j.comcom.2010.06.014
|View full text |Cite
|
Sign up to set email alerts
|

Defending RFID authentication protocols against DoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(20 citation statements)
references
References 3 publications
0
20
0
Order By: Relevance
“…Our protocol achieves the following required security properties based on the guidelines from [19][20][21].…”
Section: Security Properties Fulfilled By Our Schemementioning
confidence: 99%
“…Our protocol achieves the following required security properties based on the guidelines from [19][20][21].…”
Section: Security Properties Fulfilled By Our Schemementioning
confidence: 99%
“…They designed another version called O-RAP to simplify its operation without providing forward security. However, in 2011, Duc et al [1] pointed out two weaknesses of O-FRAP: (1) it is vulnerable to de-synchronization attack by modifying the last message to a tag to hinder the tag from updating its status; (2) A simple DOS attack on O-FRAP is easy by sending a bogus tag pseudonym to the server, which will exhaustively computes values for each tag in the database to find a match, and thus abuse the computational resources of the server. To improve the security, Duc et al proposed two RFID authentication protocols called O-FRAP + and O-RAP + , where O-FRAP + provided forward security but O-RAP + did not.…”
Section: Introductionmentioning
confidence: 97%
“…Another RFID mutual authentication protocol called O-FRAP was proposed in [18]. In this protocol, each tag and the server share a key (K) and a pseudonym (r) which are updated in every session.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, some recent research focused on the security side and ignored performance [7,8,13,12,11,17,16,18], which require the server to search all tags in the system in order to identify a single tag.…”
Section: Introductionmentioning
confidence: 99%