[PDF][PDF] Cryptanalysis of Two RFID Authentication Protocols.

T Cao, P Shen - Int. J. Netw. Secur., 2009 - Citeseer
Radio frequency identification (RFID) technologies have many advantages in applications
such as object tracking and monitoring, ticketing, supply-chain management, contactless …

Security analysis of two recently proposed RFID authentication protocols

C Lv, H Li, J Ma, M Zhao - Frontiers of Computer Science in China, 2011 - Springer
Radio frequency identification (RFID) systems suffer many security risks because they use
an insecure wireless communication channel between tag and reader. In this paper, we …

A light-weight security protocol for RFID system

JH Oh, HS Kim, JY Choi - … : The 12th IFIP International Conference on …, 2007 - Springer
RFID is automatic object identifying technology via radio frequency. And its application
areas are un-describable for its convenience and pervasiveness. However, because the …

Weaknesses in a recent ultra-lightweight RFID authentication protocol

P D'Arco, A De Santis - … 2008: First International Conference on Cryptology …, 2008 - Springer
In this paper we show weaknesses in SASI, a new Ultra-Lightweight RFID Authentication
Protocol, designed for providing S trong A uthentication and S trong I ntegrity. We identify …

A communication protocol of RFID systems in internet of things

HD Gao, YJ Guo, JQ Cui, HG Hao, H Shi - International Journal of …, 2012 - earticle.net
Radio frequency identification (RFID) is one of the key technologies which constitute internet
of things. Security and privacy issues of RFID systems is the focus of the present study. By …

Lightweight RFID mutual authentication protocol against feasible problems

Y Jin, H Sun, W Xin, S Luo, Z Chen - Information and Communications …, 2011 - Springer
The wide deployment of RFID systems has raised many concerns about the security and
privacy. Many RFID authentication protocols are proposed for these low-cost RFID tags …

[PDF][PDF] Cryptanalysis of Some RFID Authentication Protocols.

T Cao, P Shen, E Bertino - J. Commun., 2008 - jocm.us
Two effective attacks, namely de-synchronization attack and impersonation attack, against
Ha et al.'s LCSS RFID authentication protocol, Song and Mitchell's protocol are identified …

Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005

D Kwon, D Han, J Lee, Y Yeom - International Conference on Embedded …, 2006 - Springer
In this paper, we analyze the security of the RFID authentication protocol proposed by Choi
et al. at SecUbiq 2005. They claimed that their protocol is secure against all possible threats …

Novel lightweight RFID authentication protocols for inexpensive tags

AA Khorasgani, M Sajadieh, MR Yazdani - Journal of Information Security …, 2022 - Elsevier
Radio-frequency identification (RFID) systems represent a support technology employed for
the internet of things (IoT). Since RFID systems are now used extensively, it would be a …

A lightweight authentication protocol scheme for RFID security

G Wei, H Zhang - Wuhan University Journal of Natural Sciences, 2013 - Springer
Lightweight and safety are two essential features for large-scale application of radio
frequency identification (RFID) tags. Based on the analysis of potential safety problem of …