Networked RFID Systems and Lightweight Cryptography 2008
DOI: 10.1007/978-3-540-71641-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
125
0
2

Year Published

2008
2008
2013
2013

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(127 citation statements)
references
References 3 publications
0
125
0
2
Order By: Relevance
“…The EPCglobal Class1 Gen2 tag standard only defines CRC function and pseudo-random number generator for tag to operate. Although some lightweight encryption primitives for RFID tags are introduced and claim that they are adaptive to the resource constraint of RFID tag (Duc et al, 2006;Juels, 2005;Karthikeyan & Nesterenko, 2005), most of them have not demonstrated that these schemes can really work on passive tags to achieve security requirement. Poschmann et al (Poschmann et al, 2007;Poschmann et al, 2006) had proposed a new hash function requiring less number of gates to supply the need of lightweight encryption primitives for RFID authentication.…”
Section: Proposed Smap-lrs Protocolmentioning
confidence: 99%
“…The EPCglobal Class1 Gen2 tag standard only defines CRC function and pseudo-random number generator for tag to operate. Although some lightweight encryption primitives for RFID tags are introduced and claim that they are adaptive to the resource constraint of RFID tag (Duc et al, 2006;Juels, 2005;Karthikeyan & Nesterenko, 2005), most of them have not demonstrated that these schemes can really work on passive tags to achieve security requirement. Poschmann et al (Poschmann et al, 2007;Poschmann et al, 2006) had proposed a new hash function requiring less number of gates to supply the need of lightweight encryption primitives for RFID authentication.…”
Section: Proposed Smap-lrs Protocolmentioning
confidence: 99%
“…We will conclude new security RFID solutions in Section 7. Duc et al proposed a communication scheme (Duc et al, 2006) to protect user privacy for RFID system. The scheme based on a synchronous session key between tags and back-end database server to authenticate each other.…”
Section: Password Protection and Effective Randomnessmentioning
confidence: 99%
“…Pseudonyms approaches (Juels, 2004; Juel, 2006;Molnar, 2005;Avoine, 2005) is very similar to time stamping approaches except the dynamic information is scheduled from a predefined list of pseudo-random data called pseudonynms. Challenge-response approaches (Ree , 2005; Dimitriou, 2006;Duc, 2006;Chien, 2007) are the most secured techniques developed from multi-pass authentication process to provide a wide range of security and privacy protection.Open Access Database www.intechweb.org In actual situation, EPCGlogal Gen 1 (Garcia-Alfaro et al, 2008) tag implementation uses protocols that only require RFID readers to use the tags' unique serial numbers to identify the tags. Tags with the same ID will certainly confuse the reader.…”
mentioning
confidence: 99%
“…Some RFID implementation would expose tags identifications when readers inquire them. In addition, the most important security requirement for user privacy is untraceability [2,11]. With an untraceability property, an attacker cannot track tags by suing interactions with tags.…”
Section: Introductionmentioning
confidence: 99%
“…To cope with the security threats, there are several protocols had been proposed to enhance the security of RFID systems [2][3][4][5][6][7][8][9][10]. However, most of previous protocols required the support of either hash function or encryption function on the tag.…”
Section: Introductionmentioning
confidence: 99%