Tag impersonation attack on two RFID mutual authentication protocols

M Safkhani, N Bagheri, M Naderi… - … Reliability and Security, 2011 - ieeexplore.ieee.org
Security concerns of RFID systems engaged a lot of researchers to design and to
cryptanalyze RFID mutual authentication protocols. A suitable mutual authentication protocol …

A new RFID authentication protocol with resistance to server impersonation

M Akgun, MU Caglayan… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Security is one of the main issues to adopt RFID technology in daily use. Due to resource
constraints of RFID systems, it is very restricted to design a private authentication protocol …

A secure and efficient mutual authentication protocol for low-cost RFID systems

G Poulopoulos, K Markantonakis… - … on availability, reliability …, 2009 - ieeexplore.ieee.org
In this work we propose a mutual authentication protocol for RFID (Radio Frequency
Identification) systems incorporating low-cost RFID tags. These tags, due to their limited …

Afmap: Anonymous forward-secure mutual authentication protocols for rfid systems

A Sadighian, R Jalili - 2009 Third International Conference on …, 2009 - ieeexplore.ieee.org
In this paper we propose two mutual authentication protocols for RFID systems. Generally, in
RFID systems, a reader can authenticate tags in the real-time and batch modes. This paper …

An efficient RFID authentication protocol for low-cost tags

Y Liu - 2008 IEEE/IFIP International Conference on Embedded …, 2008 - ieeexplore.ieee.org
With the increased popularity of RFID applications, various authentication protocols have
been proposed to provide security and privacy for RFID tags. However, most protocols …

A mutual authentication protocol for low-cost RFID system

X Ren, X Xu - 2010 IEEE Asia-Pacific Services Computing …, 2010 - ieeexplore.ieee.org
In order to protect the privacy and the security of the tag, we propose a mutual authentication
protocol for low-cost RFID system. The protocol ensures that the reader (or server) and the …

Attacks on an efficient RFID authentication protocol

I Erguler, E Anarim - 2010 10th IEEE International Conference …, 2010 - ieeexplore.ieee.org
In this paper, we investigate the security of a recently proposed RFID authentication protocol
that needs O (1) time complexity to find out the identifier of the RFID tag irrespective of the …

Security analysis of some recent authentication protocols for RFID

B Niu, H Li, X Zhu, C Lv - 2011 Seventh International …, 2011 - ieeexplore.ieee.org
Radio frequency identification technology has been increasingly used in many applications.
However, there are many threats and security risks in the RFID systems since an insecure …

A novel hash-based RFID mutual authentication protocol

L Huixian, Y Ping, W Xuan… - … Intelligence and Security, 2011 - ieeexplore.ieee.org
RFID is considered as a significant technology which supplies amounts of change in chain
management. The most important problem with the RFID system is that the attacker can …

Rfid security protocols

H Daou, A Kayssi, A Chehab - 2008 International Conference …, 2008 - ieeexplore.ieee.org
We implement and test four RFID security protocols: strong private authentication protocol,
efficient mutual-authentication protocol, Dimitriou's lightweight protocol, and advanced semi …