An analysis of RFID tag authentication protocols using secret value

被引:0
|
作者
Cho, Jung-Sik [1 ]
Yeo, Sang-Soo [1 ]
Kim, Sung Kwon [1 ]
机构
[1] Chung Ang Univ, Sch Comp Sci & Engn, Seoul 156756, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID(Radio Frequency Identification) system is contactless automatic identification system used by small and low-cost RFID tag. An RFID tag can be stuck on or incorporated into a product, animal, or person and identify tag information by using radio frequency. RFID system will be able to replace barcode system for many merits. But the most important problem of RFID system is that unauthorized readers can access to tag information, which should be possible to produce privacy problem. Presently many researches about RFID tag authentication for solving privacy problem are going on, but these researches have many difficulties for limited hardware resource. In this paper, we analyzed RFID tag authentication protocols using secret value of many proposed. And we also dealt with many problems in the protocols and propose the future research for problem solving.
引用
收藏
页码:481 / 486
页数:6
相关论文
共 50 条
  • [1] Protocols for RFID tag/reader authentication
    Piramuthu, Selwyn
    DECISION SUPPORT SYSTEMS, 2007, 43 (03) : 897 - 914
  • [2] New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing
    Ng, Ching Yu
    Susilo, Willy
    Mu, Yi
    Safavi-Naini, Rei
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 321 - +
  • [3] Traceability Analysis of Recent RFID Authentication Protocols
    Alavi, Seyed Mohammad
    Baghery, Karim
    Abdolmaleki, Behzad
    Aref, Mohammad Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (03) : 1663 - 1682
  • [4] Untraceability Analysis of Two RFID Authentication Protocols
    Chen Xiuqing
    Cao Tianjie
    Zhai Jingxuan
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 912 - 920
  • [5] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [6] Untraceability Analysis of Two RFID Authentication Protocols
    CHEN Xiuqing
    CAO Tianjie
    ZHAI Jingxuan
    ChineseJournalofElectronics, 2016, 25 (05) : 912 - 920
  • [7] Traceability Analysis of Recent RFID Authentication Protocols
    Seyed Mohammad Alavi
    Karim Baghery
    Behzad Abdolmaleki
    Mohammad Reza Aref
    Wireless Personal Communications, 2015, 83 : 1663 - 1682
  • [8] Using dummy data for RFID tag and reader authentication
    Alsaify, Baha A.
    Thompson, Dale R.
    Alma'aitah, Abdallah
    Di, Jia
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (05) : 804 - 813
  • [9] Using dummy data for RFID tag and reader authentication
    BahaAAlsaify
    Dale RThompson
    Abdallah Almaaitah
    Jia Di
    Digital Communications and Networks, 2022, 8 (05) : 804 - 813
  • [10] Vulnerability analysis of RFID protocols for tag ownership transfer
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio C.
    Tapiador, Juan M. E.
    Li, Tieyan
    Li, Yingjiu
    COMPUTER NETWORKS, 2010, 54 (09) : 1502 - 1508