Security analysis of LMAP using AVISPA

S Islam - International journal of security and networks, 2014 - inderscienceonline.com
Radio–frequency identification (RFID) is an RFID tag based technology for providing
automated identification of both objects and humans. RFID tags have numerous potential …

Lightweight mutual authentication protocol for low cost RFID tags

EG Ahmed, E Shaaban, M Hashem - arXiv preprint arXiv:1005.4499, 2010 - arxiv.org
Radio Frequency Identification (RFID) technology one of the most promising technologies in
the field of ubiquitous computing. Indeed, RFID technology may well replace barcode …

An Ultra-Lightweight Secure RFID Authentication Protocol for Low-Cost Tags

S Kumar, H Banka, B Kaushik, S Sharma - Journal of Computer Virology …, 2024 - Springer
Abstract Radio-Frequency Identification Technology (RFID) is a non-contact identification
technology based on radio waves. It is mainly comprised of an RFID reader and RFID tags …

Security analysis of LMAP++, an RFID authentication protocol

M Safkhani, N Bagheri, M Naderi… - … Conference for Internet …, 2011 - ieeexplore.ieee.org
Low cost Radio Frequency IDentification (RFID) tags are increasingly being deployed in
various practical applications these days. Security analysis of the way these tags are used in …

[PDF][PDF] Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.

T Li, G Wang, RH Deng - J. Softw., 2008 - researchgate.net
In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID
mutual authentication protocols: LMAP [13], M2AP [14] and EMAP [15], which are recently …

Improvements over extended LMAP+: RFID authentication protocol

JB Gurubani, H Thakkar, DR Patel - Trust Management VI: 6th IFIP WG …, 2012 - Springer
Abstract Radio Frequency Identification (RFID) systems are increasingly being deployed in a
variety of applications. Widespread deployment of such contactless systems raises many …

A mutual authentication protocol for low-cost rfid tags formally verified using casperfdr and avispa

S Abughazalah, K Markantonakis… - … Conference for Internet …, 2013 - ieeexplore.ieee.org
Although Radio Frequency IDentification (RFID) systems offer many remarkable
characteristics, security and privacy concerns are not easy to address. In this paper, we aim …

Exploring the RFID mutual authentication domain

SM Mohsin, IA Khan, SM Abrar Akber… - … Journal of Computers …, 2021 - Taylor & Francis
Mutual Authentication is the initial and the most significant line of defense in any open and
trusted network system. Weaknesses in mutual authentication protocol may lead to …

Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol

G Kapoor, S Piramuthu - Engineering Applications of Artificial Intelligence, 2011 - Elsevier
As incorporation of RFID (Radio Frequency IDentification) tags in a wide variety of
applications increase, there is a need to ensure the security and privacy of the entity to …

Security analysis of two ultra-lightweight RFID authentication protocols

T Li, G Wang - IFIP international information security conference, 2007 - Springer
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual
authentication protocols: LMAP and M 2 AP, which are recently proposed by Peris-Lopez et …