A relay attack is probably the most popular assault that is normally executed over RFID security protocols. To protect RFID systems against this attack, distance bounding protocols …
A Falahati, H Azizi, RM Edwards - 2016 8th International …, 2016 - ieeexplore.ieee.org
Spectacular expansion of RFID systems and applications by several industries such as business, electronics, health, marketing, transportation, etc. has made RFID ever more …
N Chikouche, F Cherif… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
The communication channel between the tag and the reader in radiofrequency identification technology (RFID) is unsecured, which makes it opened to logical attacks on authentication …
One of the most important challenges related to RFID systems is the verification of security proprieties in RFID authentication protocols. Among the important attacks in RFID systems …
Recently, Burmester and Munilla proposed flyweight RFID authentication protocol, which is an EPC-Gen2 compliant protocol. The protocol uses synchronized pseudorandom number …
M Safkhani - Journal of Computing and Security, 2019 - jcomsec.ui.ac.ir
Security analysis of a protocol is an important step toward the public trust on its security. Recently, in 2018, Moradi et al. considered the security of the Wei and Zhang RFID EPC-C1 …
Les systèmes d'identification par radiofréquence (RFID) sont des systèmes embarqués qui ont connu des développements rapides dans les dernières années. Ces systèmes sont …
The widespread implementation of RFID in ubiquitous computing is constrained considerably by privacy and security unreliability of the wireless communication channel …