Survey: Vulnerability analysis of low-cost ECC-based RFID protocols against wireless and side-channel attacks

S Gabsi, V Beroulle, Y Kieffer, HM Dao, Y Kortli… - Sensors, 2021 - mdpi.com
The radio frequency identification (RFID) system is one of the most important technologies of
the Internet of Things (IoT) that tracks single or multiple objects. This technology is …

Review of different classes of RFID authentication protocols

A Ibrahim, G Dalkılıc - Wireless Networks, 2019 - Springer
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations
of RFID technology are security and privacy concerns. Many methods, including encryption …

Scalable RFID security protocols supporting tag ownership transfer

B Song, CJ Mitchell - Computer Communications, 2011 - Elsevier
We identify privacy, security and performance requirements for radio frequency identification
(RFID) protocols, as well as additional functional requirements such as tag ownership …

Indistinguishability beyond diff-equivalence in proverif

V Cheval, I Rakotonirina - 2023 IEEE 36th Computer Security …, 2023 - ieeexplore.ieee.org
When formalising cryptographic protocols, privacy-type properties such as strong flavours of
secrecy, anonymity or unlinkability, are often modelled by indistinguishability statements …

Flaws on RFID grouping-proofs. Guidelines for future sound protocols

P Peris-Lopez, A Orfila, JC Hernandez-Castro… - Journal of Network and …, 2011 - Elsevier
During the last years many RFID authentication protocols have been proposed with major or
minor success (van Deursen and Radomirović, 2008). Juels (2004) introduced a different …

An automated vehicle parking monitoring and management system using ANPR cameras

MY Aalsalem, WZ Khan… - 2015 17th International …, 2015 - ieeexplore.ieee.org
Car parking has become a serious problem of everyday occurrence for educational
institutions with the decreasing parking supply, increasing enrollments and high percentage …

Attacks and improvements to an RIFD mutual authentication protocol and its extensions

S Cai, Y Li, T Li, RH Deng - Proceedings of the second ACM conference …, 2009 - dl.acm.org
In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also
extended this protocol for RFID tag ownership transfer. These two protocols are designed to …

A method for verifying privacy-type properties: the unbounded case

L Hirschi, D Baelde, S Delaune - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
In this paper, we consider the problem of verifying anonymity and unlinkability in the
symbolic model, where protocols are represented as processes in a variant of the applied pi …

Secure and privacy-preserving rfid authentication scheme for internet of things applications

ML Das, P Kumar, A Martin - Wireless Personal Communications, 2020 - Springer
Privacy issue has become a crucial concern in internet of things (IoT) applications ranging
from home appliances to vehicular networks. RFID system has found enormous scope in IoT …

A method for proving unlinkability of stateful protocols

D Baelde, S Delaune, S Moreau - 2020 IEEE 33rd Computer …, 2020 - ieeexplore.ieee.org
The rise of contactless and wireless devices such as mobile phones and RFID chips justifies
significant concerns over privacy, and calls for communication protocols that ensure some …