2009 IEEE International Conference on Communications 2009
DOI: 10.1109/icc.2009.5199437
|View full text |Cite
|
Sign up to set email alerts
|

SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID Tags

Abstract: In this paper, we propose SEAS, a novel privacy preserving, anonymous authentication scheme for RFID tags, which allows the tags to use pseudonyms instead of their true identity for authentication. Using SEAS, a tag generates random numbers and uses them to create a pseudonym as its identity for authentication. The pseudonym does not reveal the identity of the tag and the pseudonyms of multiple authentications appear random and uncorrelated to the adversary. A pseudonym can only be deciphered by the back-end a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 17 publications
(44 reference statements)
0
7
0
Order By: Relevance
“…The proposed mutual authentication schemes (server-based or serverless) generally fall into three classes, namely those using hash functions [20], [23], [28], encryption [8], [9], [10], and logical operations [15], [17]. For the first two classes, instead of comparing with all proposed schemes, we compare with the underlying techniques (hash or encryption), noting that the gates/clock cycles requirements of the schemes will be at least that required by their underlying techniques.…”
Section: B Performance Evaluationmentioning
confidence: 99%
See 4 more Smart Citations
“…The proposed mutual authentication schemes (server-based or serverless) generally fall into three classes, namely those using hash functions [20], [23], [28], encryption [8], [9], [10], and logical operations [15], [17]. For the first two classes, instead of comparing with all proposed schemes, we compare with the underlying techniques (hash or encryption), noting that the gates/clock cycles requirements of the schemes will be at least that required by their underlying techniques.…”
Section: B Performance Evaluationmentioning
confidence: 99%
“…In [17], Misra et al proposed an efficient and anonymous scheme for passive tags that provides security against several possible attacks. However, this scheme relied on the server to authenticate the tag, thus requiring a persistent connection between the reader and the server.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations