We report on the security claims of an RFID authentication protocol by Li and Ding which was specifically designed for use in supply chains. We show how the protocol's vulnerabilities can be used to track products, relate incoming and outgoing products, and extort supply chain partners. Starting from a discussion of the relevant security requirements for RFID protocols in supply chains, we proceed to illustrate several shortcomings in the protocol with respect to mutual authentication, unlinkability, and desynchronization resistance. We investigate the use of the xor operator in the protocol, suggest possible improvements, and point out flaws in the proofs of the security claims.</p
Abstract Unauthorized tracking of RFID tagged assets is one of the most important privacy concerns i...
Previous research studies mostly focused on enhancing the security of radio frequency identification...
The growing use of RFID in supply chains brings along an indisputable added value from the business ...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifi...
More than half a century after its inception, radiofrequency identification (RFID) technologies are ...
Radio Frequency Identification (RFID) technology has been widely used in supply chains to track and ...
In the context of Dolev-Yao style analysis of security protocols, we investigate the security claims...
Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous inf...
AbstractIn the context of Dolev-Yao style analysis of security protocols, we investigate the securit...
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By atta...
In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle the secure ...
Every technology has advantages and disadvantages. RFID is a new technology when compared with other...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
RFID is an automatic identification system that uses radio frequency technology in product tags. The...
In addition to its benefits, the Internet of Things (IoT) technology has also opened the way to nove...
Abstract Unauthorized tracking of RFID tagged assets is one of the most important privacy concerns i...
Previous research studies mostly focused on enhancing the security of radio frequency identification...
The growing use of RFID in supply chains brings along an indisputable added value from the business ...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifi...
More than half a century after its inception, radiofrequency identification (RFID) technologies are ...
Radio Frequency Identification (RFID) technology has been widely used in supply chains to track and ...
In the context of Dolev-Yao style analysis of security protocols, we investigate the security claims...
Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous inf...
AbstractIn the context of Dolev-Yao style analysis of security protocols, we investigate the securit...
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By atta...
In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle the secure ...
Every technology has advantages and disadvantages. RFID is a new technology when compared with other...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
RFID is an automatic identification system that uses radio frequency technology in product tags. The...
In addition to its benefits, the Internet of Things (IoT) technology has also opened the way to nove...
Abstract Unauthorized tracking of RFID tagged assets is one of the most important privacy concerns i...
Previous research studies mostly focused on enhancing the security of radio frequency identification...
The growing use of RFID in supply chains brings along an indisputable added value from the business ...