2006
DOI: 10.1109/tit.2006.878219
|View full text |Cite
|
Sign up to set email alerts
|

Noisy Cryptographic Protocols for Low-Cost RFID Tags

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
22
0
2

Year Published

2007
2007
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(24 citation statements)
references
References 6 publications
0
22
0
2
Order By: Relevance
“…Recently, [9,8] have taken advantage of the noise present (or artificially generated) in the communication channel between reader and tag to enhance the security of their communication. Chabanne and Fumaroli [9] take advantage of the noise in the channel to allow readers and tags to share a secret without a passive adversary being able to learn it. Both the readers and tags perform a protocol where information reconciliation and privacy amplification through the use of universal hash functions takes place.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, [9,8] have taken advantage of the noise present (or artificially generated) in the communication channel between reader and tag to enhance the security of their communication. Chabanne and Fumaroli [9] take advantage of the noise in the channel to allow readers and tags to share a secret without a passive adversary being able to learn it. Both the readers and tags perform a protocol where information reconciliation and privacy amplification through the use of universal hash functions takes place.…”
Section: Related Workmentioning
confidence: 99%
“…More engineering oriented approaches have also been introduced such as the IBM clipped tags [28] or distance bounding protocols [33]. Finally, we have begun to see the development of techniques that take advantage of noise in the communication channel between reader and tag to camouflage their communication [8,9]. We will refer to such approaches as algsics methods 6 .…”
mentioning
confidence: 99%
“…Lately, Radio Frequency Identification (RFID) [1][2][3][4][5][6][7][8][9][10][11][12] has attract a great attention as a new spotlight technology for assisting the computing systems everywhere. In the existing open network situation, RFID recognizes an entity via radio frequency technique which is a type of non-contact automatic identification method.…”
Section: Introductionmentioning
confidence: 99%
“…Security for inductively-coupled communication has previously been connected [14], [15] to the wiretap channel [16], a canonical problem in information-theoretic security [17]. However [14], [15] do not use a physical model for an inductively-coupled link.…”
mentioning
confidence: 99%
“…However [14], [15] do not use a physical model for an inductively-coupled link. Ytrehus points out that for inductive coupling, "an eavesdropper needs to insert his/her own additional antenna into the system, and this may detune the overall system and make it difficult or impossible to carry out the legitimate conversation" [3].…”
mentioning
confidence: 99%