2012
DOI: 10.1002/sec.650
|View full text |Cite
|
Sign up to set email alerts
|

Unified privacy analysis of new‐found RFID authentication protocols

Abstract: Ubiquitousness of Radio Frequency Identification (RFID) systems with inherent weaknesses has been a cause of concern about their privacy and security. Therefore, secure protocols are essentially necessary for the RFID tags to guarantee privacy and authentication among them and the reader. This paper inspects privacy in the RFID systems. First, we survey four new-found RFID authentication protocols, and then, their weaknesses in formal privacy model are analyzed. Although the authors of the schemes claimed that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…Therefore, these healthcare systems are vulnerable to attacks due to the use of RFID. In order to remove these vulnerabilities, various security protocols are provided for secure communication within these networks, some of which are based on symmetric cryptography [16][17][18][19][20][21][22][23][24][25], and others are based on asymmetric cryptography [3,7,[26][27][28]. Some of these protocols deal with the authentication between the card and the server, in which they confirm each other [3,7,[26][27][28] and others have authentication between the card and the reader [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, these healthcare systems are vulnerable to attacks due to the use of RFID. In order to remove these vulnerabilities, various security protocols are provided for secure communication within these networks, some of which are based on symmetric cryptography [16][17][18][19][20][21][22][23][24][25], and others are based on asymmetric cryptography [3,7,[26][27][28]. Some of these protocols deal with the authentication between the card and the server, in which they confirm each other [3,7,[26][27][28] and others have authentication between the card and the reader [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…Lately, Radio Frequency Identification (RFID) [1][2][3][4][5][6][7][8][9][10][11][12] has attract a great attention as a new spotlight technology for assisting the computing systems everywhere. In the existing open network situation, RFID recognizes an entity via radio frequency technique which is a type of non-contact automatic identification method.…”
Section: Introductionmentioning
confidence: 99%
“…This will lead to either too much blank spaces within a time frame or collisions happening more often [7]. Although dynamic frame slotting ALOHA calculation method's frame size can be adjusted [8], it does not have a high system efficacy and its design is too complicated. Q calculation method on the other hand, belongs to a type named as heuristic calculation method [9].…”
Section: Introductionmentioning
confidence: 99%