Abstract. Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based symmetric cryptography because of the limited resources of RFID tags. Recently Cheng et. al have been proposed an RFID security protocol based on chaotic maps. In this paper, we analyze the security of this protocol and discover its vulnerabilities. We firstly present a de-synchronization attack in which a passive adversary makes the shared secrets out-of-synchronization by eavesdropping just one protocol session. We secondly present a secret disclosure attack in which a passive adversary extracts secrets of a tag by eavesdropping just one protocol session. An adversary havin...
There is a high need for secure authentication protocols conforming with the EPC Class-1 Generation ...
We introduce server impersonation attacks, a practical security threat to RFID security protocols th...
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The...
peer reviewedRadio frequency identification (RFID) technology has been increasingly integrated into ...
Abstract—It is a common practice to employ encryption functions to provide security for an applicati...
AbstractIn the context of Dolev-Yao style analysis of security protocols, we investigate the securit...
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al.’...
Part 2: ProtocolsInternational audienceIn this paper, we scrutinize the security of an RFID protocol...
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al.’...
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authenti...
Existing RFID Privacy-Preserving Authentication (PPA) solutions mainly focus on the design of crypto...
Abstract. In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutua...
RFID is a widely adopted technology in the enterprises for inventory checking and management. Due to...
The characteristics of radio frequency identification (RFID) systems introduce growing security and ...
Abstract. Mutual authentication mechanisms can be used in RFID sys-tems to preserve the confidential...
There is a high need for secure authentication protocols conforming with the EPC Class-1 Generation ...
We introduce server impersonation attacks, a practical security threat to RFID security protocols th...
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The...
peer reviewedRadio frequency identification (RFID) technology has been increasingly integrated into ...
Abstract—It is a common practice to employ encryption functions to provide security for an applicati...
AbstractIn the context of Dolev-Yao style analysis of security protocols, we investigate the securit...
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al.’...
Part 2: ProtocolsInternational audienceIn this paper, we scrutinize the security of an RFID protocol...
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al.’...
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authenti...
Existing RFID Privacy-Preserving Authentication (PPA) solutions mainly focus on the design of crypto...
Abstract. In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutua...
RFID is a widely adopted technology in the enterprises for inventory checking and management. Due to...
The characteristics of radio frequency identification (RFID) systems introduce growing security and ...
Abstract. Mutual authentication mechanisms can be used in RFID sys-tems to preserve the confidential...
There is a high need for secure authentication protocols conforming with the EPC Class-1 Generation ...
We introduce server impersonation attacks, a practical security threat to RFID security protocols th...
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The...