Loading...

Privacy analysis and improvements of two recent RFID authentication protocols

Baghery, K ; Sharif University of Technology

439 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISCISC.2014.6994037
  3. Abstract:
  4. Radio Frequency Identification (RFID) technology is being deployed at our daily life. Although RFID systems provide useful services to users, they can also threat the privacy and security of the end-users. In order to provide privacy and security for RFID users, different RFID authentication protocols have been proposed. In this study, we investigate the privacy of two recently proposed RFID authentication protocols. It is shown that these protocols have some privacy problems that cannot provide user privacy. Then, in order to enhance the privacy of these protocols, two improvements of analyzed protocols are proposed that provide RFID users privacy
  5. Keywords:
  6. EPC C1 G2 standard ; Privacy ; RFID authentication protocols ; Traceability attacks ; Authentication ; Data privacy ; Security of data ; Privacy analysis ; Privacy and security ; Privacy problems ; Radio frequency identification technology ; RFID systems ; User privacy ; Radio frequency identification (RFID)
  7. Source: 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 3-4 September , 2014 , pp. 137-142 ; ISBN: 9781479953837
  8. URL: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6994037&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6994037