By Topic

Security Analysis of Some RFID Authentication Protocols

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Shaohui Wang ; Coll. of Comput., Nanjing Univ. of Post & Telecommun., Nanjing, China ; Faxing Wang

RFID-based systems are becoming a widely deployed pervasive technology that is more and more used in applications where privacy sensitive information is entrusted to RFID tags. A secure RFID system should provide untraceability (preventing unauthorized tag tracking) and authentication (preserving the confidentiality). In this paper, we give the security analysis of two type of recently proposed RFID authentication protocols, one assuming the tag can compute hash functions and the other utilizing anonymizer to provide anonymity. The analysis shows that the two protocols can not resist tracking attack and desynchronization attack.

Published in:

2010 2nd International Conference on E-business and Information System Security

Date of Conference:

22-23 May 2010