Review of different classes of RFID authentication protocols

A Ibrahim, G Dalkılıc - Wireless Networks, 2019 - Springer
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations
of RFID technology are security and privacy concerns. Many methods, including encryption …

A lightweight RFID mutual authentication protocol based on physical unclonable function

H Xu, J Ding, P Li, F Zhu, R Wang - Sensors, 2018 - mdpi.com
With the fast development of the Internet of Things, Radio Frequency Identification (RFID)
has been widely applied into many areas. Nevertheless, security problems of the RFID …

Attacks on RFID protocols

T Van Deursen, S Radomirović - Cryptology ePrint Archive, 2009 - discovery.dundee.ac.uk
This document consists of a collection of attacks upon RFID protocols and is meant to serve
as a quick and easy reference. This document will be updated as new attacks are found …

Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard

P Peris-Lopez, JC Hernandez-Castro… - Computer Standards & …, 2009 - Elsevier
In 2006, the standard EPC Class-1 Generation-2 (EPC-C1G2) was ratified both by
EPCglobal and ISO. This standard can be considered as a “universal” specification for low …

New privacy results on synchronized RFID authentication protocols against tag tracing

CY Ng, W Susilo, Y Mu, R Safavi-Naini - Computer Security–ESORICS …, 2009 - Springer
Many RFID authentication protocols with randomized tag response have been proposed to
avoid simple tag tracing. These protocols are symmetric in common due to the lack of …

[PDF][PDF] Cryptanalysis of Some RFID Authentication Protocols.

T Cao, P Shen, E Bertino - J. Commun., 2008 - jocm.us
Two effective attacks, namely de-synchronization attack and impersonation attack, against
Ha et al.'s LCSS RFID authentication protocol, Song and Mitchell's protocol are identified …

Security of RFID protocols–a case study

T van Deursen, S Radomirović - Electronic Notes in Theoretical Computer …, 2009 - Elsevier
In the context of Dolev-Yao style analysis of security protocols, we investigate the security
claims of a recently proposed RFID authentication protocol. We exhibit a flaw which has …

Authentication and lightweight cryptography in low cost RFID

H Mobahat - 2010 2nd international conference on software …, 2010 - ieeexplore.ieee.org
Technology-driven transactions, or e-commerce, should not involve a tradeoff in which
consumers relinquish widening amounts of their privacy in return for greater convenience …

ITPMAP: An improved three-pass mutual authentication protocol for secure RFID systems

MI Younis, MH Abdulkareem - Wireless Personal Communications, 2017 - Springer
Radio frequency identification (RFID) is a wireless technology used in various applications
to minimize the complexity of everyday life. However, it opens a large number of security and …

On a new formal proof model for RFID location privacy

T Van Deursen, S Radomirović - Information Processing Letters, 2009 - Elsevier
We discuss a recently proposed formal proof model for RFID location privacy. We show that
protocols which intuitively and in several other models are considered not to be location …