2010
DOI: 10.5121/ijnsa.2010.2203
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

Abstract: ABSTRACT

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…The messages exchanged reduce to a combination of addition and XOR operations, and after a few algebraic manipulations, the secret ID is disclosed. A similar approach also succeeds on the SASI protocol [38]. The most devastating attack is the disclosure attack, where the tag ID and the shared secrets are exposed with relatively little effort.…”
Section: Weaknesses Of Rotation Function Based Protocolsmentioning
confidence: 91%
See 2 more Smart Citations
“…The messages exchanged reduce to a combination of addition and XOR operations, and after a few algebraic manipulations, the secret ID is disclosed. A similar approach also succeeds on the SASI protocol [38]. The most devastating attack is the disclosure attack, where the tag ID and the shared secrets are exposed with relatively little effort.…”
Section: Weaknesses Of Rotation Function Based Protocolsmentioning
confidence: 91%
“…After a first round of evaluations, some weaknesses were detected in Gossamer [6,37,38]. The first weakness appears in the updating of the IDS and the shared secrets.…”
Section: Weaknesses Of Rotation Function Based Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed scheme can be divided into three phases: registration, encryption, and decryption. The decryption phase is subdivided into two cases because of the consent exceptions [4][5][6][7].…”
Section: Model Of Attacks In U-healthcare Systemmentioning
confidence: 99%
“…A "hello" and IDS message are sent by means of the channel in the identification phase. The authentication phase transmits the messages A||B||C and D. Therefore, if 5 bytes are assumed for the "hello" message, then an aggregate of 424 bits are transferred over the channel [35].…”
Section: Communication Overheadmentioning
confidence: 99%