The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article...
Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubiquitous communication. These systems can also work in combination with cellular networks to control user's physical objects in a secure way with sufficient privacy. This paper presents...
In recent years, advances in radio frequency identification (RFID) technology has led to their widespread adoption in diverse applications such as object identification, access authorization, environmental monitoring and supply chain management. Although the increased proliferation of tags enables new applications, they also raise many unique and potentially serious security and privacy concerns....
The system proposed in this thesis allows acquiring security by using two dimensional array technique to enhance the security of the existing RFID system. The proposed system uses the value of UID which is an original ID value of RFID Tag and two dimensional array to authenticate between the tag and the reader. In order to code/decode in the proposed system, it uses the key set defined by the manager...
Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authentication via bitwise operations. Following each proposal, a series of papers have been published to point out serious limitations on the security of such protocols. In this paper, we provide a detailed analysis of the security of...
Due to the well-developed technology, the radio frequency identification (RFID) is widely used in all areas. For some applications, the RFID system simply worked as a memory card without security mechanism. However, in many applications, the RFID systems need security mechanism for authentication. In scenario such as e-passport, the RFID systems even need mechanism to protect userpsilas privacy. In...
To resolve the security vulnerabilities and comply with EPC class 1 Gen 2 UHF RFID (EPC C1G2) Standard at the same time, we present a privacy guaranteed mutual authentication protocol (PGMAP). By utilizing the existing functions and memory bank of tag, we amend the processing sequence based on current EPC architecture. An auto-updating index number IDS is enrolled to provide privacy protection to...
Recently the concern about security and privacy issues of RFID tags have emerged just because of the vital information in the operation of the RFID system at open radio frequency circumstance. To overcome these threats, this paper presents a mutual authentication mechanism, renewing the tag's key value in each process, which can solve the problem such as privacy or wiretapping, replay attack, forward...
Most of authentication protocols in the RFID system use the lightweight operation, such as hash function, because the tag lacks computational resources, memory, power and communication ability. The security of different protocols based on the hash function is analyzed. Afterwards, this paper finds the security drawbacks of the improved security solution proposed by Wang and presents an attack against...
Radio Frequency Universal Smart Cards (RF-UCard) open up the possibility for various attacks violating user privacy. In this paper, we propose a strong and lightweight role-based mutual authentication protocol. By employing the mutual authentication and the reader-role validation, the protocol can effectively defend against both passive and active attacks, including the invalid data access from the...
Radio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. On the other hand, the low-cost RFID system has potential risks such as privacy and security problems, which would be a big barrier for the application. First of all, we analyze the current security protocols for the RFID system. To protect user privacy and remove security vulnerabilities, we propose...
Performing tag-reader mutual authentication to detect cloned fake tags and ward off malicious readers is a basic requirement of various applications of RFID technology. In this paper, we propose an efficient RFID tag-reader mutual authentication scheme that is light weight, simple to implement and can effectively alleviates tracking and replaying threats. This scheme also has good performance and...
Radio frequency identification (RFID) is a technology that allows automatic identification and data capture by using radio frequencies. In 2006, Osaka et al. proposed a RFID security method based on a hash function and a symmetric key cryptosystem. Osaka et al. claimed that their proposed RFID security method achieves the following security requirements such as (1) indistinguishability, (2) forward...
As RFID applications become widespread, different authentication schemes have been proposed to address the security and privacy issues in RFID systems. Most recent protocols have employed a "central server" model. This kind of authentication is vulnerable to Dos attack. In this paper, we present an RFID offline authentication protocol with Dos resilience, ROAD, which provides a more flexible...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifically designed for use in supply chains. We show how the protocol's vulnerabilities can be used to track products, relate incoming and outgoing products, and extort supply chain partners. Starting from a discussion of the relevant security requirements for RFID protocols in supply chains, we proceed...
Lightweight authentication protocols are necessary in the RFID system because the tag lacks computational resources, memory, power and communication ability. This paper analyzes the security of different lightweight protocols in the HB protocol family and presents an active attack against the modified HB++ protocol proposed by Selwyn Piramuthu. According to this attack, the AUHB++ protocol is proposed...
In this paper, we expose a denial of information attack that is possible due to the misuse of the kill password (specified under the EPC Class-1 Gen-2 standard [1]) in a previously proposed RFID tag-reader mutual authentication scheme [2]. We show how a passive eavesdropper can obtain useful information by monitoring the authentication session involving a target tag and correlating the information...
Radio frequency identification (RFID) systems have been aggressively deployed in a variety of applications. RFID security and privacy issues have been intensively studied in the research field, of which the authentication between RFID reader and tag is the fundamental theme. Most of the existing authentication protocols draw assumptions on classic cryptographic primitives. However, for extremely resource...
The RFID is one of the most important technique in ubiquitous for low power, lightweight features and needs fast and safe authentication scheme for security. The existing scheme has heavy load between tag and reader communication and it is hard to give efficient security to the authentication scheme with low cost. This paper proposes a new type of fast and lightweight authentication module that has...
We introduce server impersonation attacks, a practical security threat to RFID security protocols that has not previously been described. RFID tag memory is generally not tamper-proof for cost reasons. We show that, if a tag is compromised, such attacks can give rise to desynchronisation between server and tag in a number of existing RFID authentication protocols. We also describe possible countermeasures...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.