AbstractCurrent research on UHF RFID system security mainly focus on protecting communication safety and information privacy between a pair of specific tags and its corresponding interrogation reader. However, instead of stealing detailed private information of tags, adversaries may just want to estimate the cardinality of tags, which is named counting attack. Unfortunately, most existing protocols are vulnerable to counting attack. To defend against this attack, in this paper we propose ACSP, a novel Anti-Counting Security Protocol. ACSP employs session identifier and provides a corresponding authentication metric to verify the commands sent by the reader. To handle counting attack, ACSP periodically updates the session identifier, and sec...
Future trend of RFID system is moving towards integration with other devices, and hence making it mo...
RFID (Radio Frequency Identification) tags use light weighted security methods because of cost const...
International Conference on Information Security and Cryptology (ICISC 2010) in Seoul, Korea.Recentl...
AbstractCurrent research on UHF RFID system security mainly focus on protecting communication safety...
RFID system (Radio-Frequency Identification) is a technology for automated identification of objects...
Low-cost RFID tags are already being used for supply chain management and are a promising new techno...
Security plays a vital role during the transmission of private data from one sender to the other. Al...
Like all growing technologies, radio frequency identification brings along its share of security-rel...
Low-cost radio frequency identification (RFID) tags conforming to the EPCglobal Class-1 Generation-2...
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems i...
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much inter...
This paper proposes an improved two-way security authentication protocol to improve the security lev...
Abstract—Nowadays Radio Frequency Identification (RFID) technologies are applied in many fields for ...
Abstract—Widespread adoption of RFID technology is being slowed down because of increasing public co...
Wireless radio frequency identification (RFID) has been widely used as the core technology of the In...
Future trend of RFID system is moving towards integration with other devices, and hence making it mo...
RFID (Radio Frequency Identification) tags use light weighted security methods because of cost const...
International Conference on Information Security and Cryptology (ICISC 2010) in Seoul, Korea.Recentl...
AbstractCurrent research on UHF RFID system security mainly focus on protecting communication safety...
RFID system (Radio-Frequency Identification) is a technology for automated identification of objects...
Low-cost RFID tags are already being used for supply chain management and are a promising new techno...
Security plays a vital role during the transmission of private data from one sender to the other. Al...
Like all growing technologies, radio frequency identification brings along its share of security-rel...
Low-cost radio frequency identification (RFID) tags conforming to the EPCglobal Class-1 Generation-2...
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems i...
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much inter...
This paper proposes an improved two-way security authentication protocol to improve the security lev...
Abstract—Nowadays Radio Frequency Identification (RFID) technologies are applied in many fields for ...
Abstract—Widespread adoption of RFID technology is being slowed down because of increasing public co...
Wireless radio frequency identification (RFID) has been widely used as the core technology of the In...
Future trend of RFID system is moving towards integration with other devices, and hence making it mo...
RFID (Radio Frequency Identification) tags use light weighted security methods because of cost const...
International Conference on Information Security and Cryptology (ICISC 2010) in Seoul, Korea.Recentl...