Scalable RFID security protocols supporting tag ownership transfer

2011 ◽  
Vol 34 (4) ◽  
pp. 556-566 ◽  
Author(s):  
Boyeon Song ◽  
Chris J. Mitchell
RFID Security ◽  
2008 ◽  
pp. 147-176 ◽  
Author(s):  
Kyosuke Osaka ◽  
Tsuyoshi Takagi ◽  
Kenichi Yamazaki ◽  
Osamu Takahashi

Author(s):  
Kyosuke Osaka ◽  
Tsuyoshi Takagi ◽  
Kenichi Yamazaki ◽  
Osamu Takahashi

2012 ◽  
Vol 6 (3) ◽  
pp. 56-74 ◽  
Author(s):  
Azam Zavvari ◽  
Ahmed Patel

Radio Frequency Identification (RFID) system is a low-cost contactless automatic identification technology; and barcode as a traditional technology is now broadly replaced by RFID systems to make objects more manageable in supply chains and other enterprises. This technology is operational in open wireless communication spaces whereby its transmission signals can be easily accessed resulting in security problems. Consequently, it becomes an absolute necessity to develop efficient security protocols to protect the data against various attacks. This paper outlines a critical evaluation of the RFID systems, the security and privacy issues in the RFID security protocols, the EPCglobal Class-1 Generation-2 standard as it is an international standard, its lower cost of implementation, and high speed data transmission and operation.


2012 ◽  
Vol 241-244 ◽  
pp. 2331-2334
Author(s):  
Miao Lei Deng ◽  
Hao Jun Zhang ◽  
Wei Jun Zhu

Radio frequency identification (RFID) systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. This paper analyze two of the newest RFID security protocols which proposed by Niu et al. and Fu et al. form the security viewpoint of data desynchronization attack. These two lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these two RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand space model, data desynchronization attacks on these two protocols were analyzed. Furthermore, improvements to overcome the security vulnerabilities of these two protocols were given.


Sign in / Sign up

Export Citation Format

Share Document