2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT) 2015
DOI: 10.1109/conecct.2015.7383895
|View full text |Cite
|
Sign up to set email alerts
|

On the security of RFID authentication protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Some solutions have been presented to mitigate issues at this layer, which predominately involve the inclusion of the aforementioned security features in a constrained form or physical security to the device itself. Many of these solutions have been shown to be flawed, due to the constrained nature as mentioned previously (such as with IEEE 802.15.4 [23], bluetooth [24], RFID [25] or WiFi [26]). Additionally, these solutions do not protect attacks from upper layers as this requires an adequate IDS [9].…”
Section: A Perceptionmentioning
confidence: 99%
“…Some solutions have been presented to mitigate issues at this layer, which predominately involve the inclusion of the aforementioned security features in a constrained form or physical security to the device itself. Many of these solutions have been shown to be flawed, due to the constrained nature as mentioned previously (such as with IEEE 802.15.4 [23], bluetooth [24], RFID [25] or WiFi [26]). Additionally, these solutions do not protect attacks from upper layers as this requires an adequate IDS [9].…”
Section: A Perceptionmentioning
confidence: 99%