Loading...
Search for: e-passport
0.008 seconds

    Addressing flaws in RFID authentication protocols

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7107 LNCS , 2011 , Pages 216-235 ; 03029743 (ISSN) ; 9783642255779 (ISBN) Habibi, M. H ; Aref, M. R ; Ma, D ; Sharif University of Technology
    2011
    Abstract
    The development of RFID systems in sensitive applications like e-passport, e-health, credit cards, and personal devices, makes it necessary to consider the related security and privacy issues in great detail. Among other security characteristic of an RFID authentication protocol, untraceability and synchronization are the most important attributes. The former is strongly related to the privacy of tags and their holders, while the latter has a significant role in the security and availability parameters. In this paper, we investigate three RFID authentication protocols proposed by Duc and Kim, Song and Mitchell, and Cho, Yeo and Kim in terms of privacy and security. We analyze the protocol...