H Xu, J Ding, P Li, F Zhu, R Wang - Sensors, 2018 - mdpi.com
With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID …
T Van Deursen, S Radomirović - Cryptology ePrint Archive, 2009 - discovery.dundee.ac.uk
This document consists of a collection of attacks upon RFID protocols and is meant to serve as a quick and easy reference. This document will be updated as new attacks are found …
In 2006, the standard EPC Class-1 Generation-2 (EPC-C1G2) was ratified both by EPCglobal and ISO. This standard can be considered as a “universal” specification for low …
Many RFID authentication protocols with randomized tag response have been proposed to avoid simple tag tracing. These protocols are symmetric in common due to the lack of …
T Cao, P Shen, E Bertino - J. Commun., 2008 - jocm.us
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al.'s LCSS RFID authentication protocol, Song and Mitchell's protocol are identified …
T van Deursen, S Radomirović - Electronic Notes in Theoretical Computer …, 2009 - Elsevier
In the context of Dolev-Yao style analysis of security protocols, we investigate the security claims of a recently proposed RFID authentication protocol. We exhibit a flaw which has …
H Mobahat - 2010 2nd international conference on software …, 2010 - ieeexplore.ieee.org
Technology-driven transactions, or e-commerce, should not involve a tradeoff in which consumers relinquish widening amounts of their privacy in return for greater convenience …
MI Younis, MH Abdulkareem - Wireless Personal Communications, 2017 - Springer
Radio frequency identification (RFID) is a wireless technology used in various applications to minimize the complexity of everyday life. However, it opens a large number of security and …
T Van Deursen, S Radomirović - Information Processing Letters, 2009 - Elsevier
We discuss a recently proposed formal proof model for RFID location privacy. We show that protocols which intuitively and in several other models are considered not to be location …