Browse > Article
http://dx.doi.org/10.6109/jicce.2011.9.4.441

Analyses of Security and Privacy Issues in Ultra-weight RFID Protocol  

Kim, Jung-Tae (Department of Electronic Engineering, Mokwon University)
Abstract
Radio frequency identification (RFID) tags are cheap and simple devices that can store unique identification information and perform simple computation to keep better inventory of packages. Security protocol for RFID tags is needed to ensure privacy and authentication between each tag and their reader. In order to accomplish this, in this paper, we analyzed a lightweight privacy and authentication protocol for passive RFID tags.
Keywords
RFID Protocol; Security Model; Privacy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 352-361, Springer, Heidelberg, 2006
2 Andrey B,etcs, "Hash functions and RFID tags: Mind the Gap:, CHES 2008, LNCS, pp.283-299, 2008
3 Raphael C.-W. Phan, "Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI", IEEE Transaction on Dependable and Secure Computing, V.6, N.4, pp.316-320, OCTOBER-DECEMBER 2009   DOI   ScienceOn
4 I. Vajda and L. Buttyan, "Lightweight authentication protocols for low cost RFID tags," in Proc, 2nd Workshop on Security in Ubiquitous Computer, 2003, pp.76-82
5 M. Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.3156, pp.357-370, 2004.
6 Martin Feldhofer, "Strong crypto for RFID Tag, - A comparison of low power hardware implementation", 2007 IEEE, pp. 1839-1842.
7 Yanjun Zuo, "Survivable RFID Systems: Issues, Challenges, and Techniques", IEEE Transaction on Systems Man and Cybernetics,-PART C: Applications and reviews, V. 40, N. 4, pp. 406-418, JULY 2010.