2009 16th International Conference on Industrial Engineering and Engineering Management 2009
DOI: 10.1109/icieem.2009.5344198
|View full text |Cite
|
Sign up to set email alerts
|

Low-cost mutual RFID authentication model using predefined password lists

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The exchange can be detected, unless counterfeits are also equipped with tags and all authentic tags are copied and attached to the counterfeits. This kind of attack requires the knowledge of EPCs of the original tags, which can be read by commodity readers unless specific tags with on-tag security implementations, such as physically uncloneable functions or predefined password lists are used [46,59].…”
Section: Role A: Manufacturermentioning
confidence: 99%
“…The exchange can be detected, unless counterfeits are also equipped with tags and all authentic tags are copied and attached to the counterfeits. This kind of attack requires the knowledge of EPCs of the original tags, which can be read by commodity readers unless specific tags with on-tag security implementations, such as physically uncloneable functions or predefined password lists are used [46,59].…”
Section: Role A: Manufacturermentioning
confidence: 99%
“…This exchange can be detected, unless counterfeits are also equipped with tags and all authentic tags are copied and attached to the counterfeits. This attack requires the knowledge of the EPCs of the original tags, which can be read by commodity readers unless specific tags with on-tag security implementations, such as physically uncloneable functions [27] or predefined password lists [28], are used.…”
Section: Security Evaluationmentioning
confidence: 99%