Privacy Analysis and Improvements of Two Recent RFID Authentication Protocols

被引:0
|
作者
Baghery, Karim [1 ]
Abdolmaleki, Behzad [1 ]
Akhbari, Bahareh [2 ]
Aref, Mohammad Reza [3 ]
机构
[1] Sharif Univ Technol, ISSL Lab, Tehran, Iran
[2] KN Toosi Univ Technol, EE Dept, Tehran, Iran
[3] Sharif Univ Technol, ISSL Lab, EE Dept, Tehran, Iran
关键词
RFID authentication protocols; privacy; traceability attacks; EPC C1 G2 standard; STANDARD;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Radio Frequency Identification (RFID) technology is being deployed at our daily life. Although RFID systems provide useful services to users, they can also threat the privacy and security of the end-users. In order to provide privacy and security for RFID users, different RFID authentication protocols have been proposed. In this study, we investigate the privacy of two recently proposed RFID authentication protocols. It is shown that these protocols have some privacy problems that cannot provide user privacy. Then, in order to enhance the privacy of these protocols, two improvements of analyzed protocols are proposed that provide RFID users privacy.
引用
收藏
页码:137 / 142
页数:6
相关论文
共 50 条
  • [1] Provably privacy analysis and improvements of the lightweight RFID authentication protocols
    Gholami, Vali
    Alagheband, Mandi R.
    [J]. WIRELESS NETWORKS, 2020, 26 (03) : 2153 - 2169
  • [2] Provably privacy analysis and improvements of the lightweight RFID authentication protocols
    Vali Gholami
    Mahdi R. Alagheband
    [J]. Wireless Networks, 2020, 26 : 2153 - 2169
  • [3] Privacy of recent RFID authentication protocols
    Ouafi, Khaled
    Phan, Raphael C. -W.
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 263 - +
  • [4] Traceability Analysis of Recent RFID Authentication Protocols
    Alavi, Seyed Mohammad
    Baghery, Karim
    Abdolmaleki, Behzad
    Aref, Mohammad Reza
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (03) : 1663 - 1682
  • [5] Traceability Analysis of Recent RFID Authentication Protocols
    Seyed Mohammad Alavi
    Karim Baghery
    Behzad Abdolmaleki
    Mohammad Reza Aref
    [J]. Wireless Personal Communications, 2015, 83 : 1663 - 1682
  • [6] Weaknesses in Two Recent Lightweight RFID Authentication Protocols
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio C.
    Tapiador, Juan M. E.
    Li, Tieyan
    van der Lubbe, Jan C. A.
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 383 - +
  • [7] Untraceability Analysis of Two RFID Authentication Protocols
    Chen Xiuqing
    Cao Tianjie
    Zhai Jingxuan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 912 - 920
  • [8] Untraceability Analysis of Two RFID Authentication Protocols
    CHEN Xiuqing
    CAO Tianjie
    ZHAI Jingxuan
    [J]. Chinese Journal of Electronics, 2016, 25 (05) : 912 - 920
  • [9] Attacks and Improvements on Two New-Found RFID Authentication Protocols
    Abdolmaleki, Behzad
    Baghery, Karim
    Akhbari, Bahareh
    Aref, Mohammad Reza
    [J]. 2014 7th International Symposium on Telecommunications (IST), 2014, : 895 - 900
  • [10] Study of the Privacy Models in RFID Authentication Protocols
    Shen, Jian
    Zheng, Wenying
    Wang, Jin
    Xia, Zhihua
    Fu, Zhangjie
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 345 - 353