Wireless radio frequency identification (RFID) has been widely used as the core technology of the Internet of Things, but it also brings many potential security risks. In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols have security risks, and two targeted attack methods are proposed. Next, two RFID security authentication protocols which can resist the DoS, replay, and tracing attacks are designed. The first protocol uses index grouping and dynamic renewal mechanism. Since the Rabin public key encryption algorithm verification only requires square and modulo operations, the second protocol introduces the public key encryption algorithm into the cost-sensitive RFI...
[[abstract]]Wireless Radio Frequency Identification (RFID) has been adopted by the biggest retailer ...
RFID systems have been scrutinized nowadays as one of the emerging technologies in pervasive environ...
Abstract—In the past few years, the design of RFID authentication protocols in accordance with the E...
This paper proposes an improved two-way security authentication protocol to improve the security lev...
Abstract:- The RFID market in Europe is growing. It is expected that in 2007 the market exceeds 2.5 ...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (...
Nowadays, the Radio Frequency Identification (RFID) technology is widely used in lots of application...
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we ad...
Radio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures....
Low-cost RFID tags are already being used for supply chain management and are a promising new techno...
AbstractSecurity and privacy vulnerabilities in RFID authentication protocols may affect RFID users ...
RFID is a widely adopted technology in the enterprises for inventory checking and management. Due to...
The recently proposed Radio Frequency Identification (RFID) authentication protocol based on a hashi...
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID ...
[[abstract]]Wireless Radio Frequency Identification (RFID) has been adopted by the biggest retailer ...
RFID systems have been scrutinized nowadays as one of the emerging technologies in pervasive environ...
Abstract—In the past few years, the design of RFID authentication protocols in accordance with the E...
This paper proposes an improved two-way security authentication protocol to improve the security lev...
Abstract:- The RFID market in Europe is growing. It is expected that in 2007 the market exceeds 2.5 ...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (...
Nowadays, the Radio Frequency Identification (RFID) technology is widely used in lots of application...
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we ad...
Radio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures....
Low-cost RFID tags are already being used for supply chain management and are a promising new techno...
AbstractSecurity and privacy vulnerabilities in RFID authentication protocols may affect RFID users ...
RFID is a widely adopted technology in the enterprises for inventory checking and management. Due to...
The recently proposed Radio Frequency Identification (RFID) authentication protocol based on a hashi...
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID ...
[[abstract]]Wireless Radio Frequency Identification (RFID) has been adopted by the biggest retailer ...
RFID systems have been scrutinized nowadays as one of the emerging technologies in pervasive environ...
Abstract—In the past few years, the design of RFID authentication protocols in accordance with the E...