Article Information  
A Novel Security Method For RFID Tags

Keywords: RFID Security, RFID Attacks, Cloning Attack, Lightweight Security Method.

Mehran University Research Journal of Engineering & Technology

Volume 31 ,  Issue 3

Imran  Ali  Jokhio , Sana  Hoor Jokhio , Javed  Ali Baloch ,

References
1. EPCglobal, “The EPCglobal Network”, 2004. http:// www.epcglobalinc.org/. (Last Accessed January 2012).
2. EPCglobal, “EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz”, Standard, January, 2005.
3. Juels, A., and Stephen, A., “Weis. Defining Strong Privacy for RFID”, ACM Transactons on Information Systems Securiry, Volume 13, No. 1, pp. 1-23, 2009.
4. Ronald, L., and Rivest, S.A., Weis, S.E.S., and Daniel, W.E., “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, Security in Pervasive Computing, Volume 2802, 2004 of Lecture Notes in Computer Science, pp. 50-59. Springer Berlin/Heidelberg, January, 2004.
5. Mala, M., “Privacy for RFID Systems to Prevent Tracking and Cloning”, International Journal of Computer Science and Network Security, Volume 8, No. 1, pp. 1-5, January, 2008.
6. Domingo-Ferrer, J., Posegga, J., FrancescSebe, and Vicenc, T., “Advances in Smart Cards”, Computer Network, Volume 51, No. 9, pp. 2219-2222, 2007.
7. Gilbert, H., Matthew, J.R., and YannickSeurin, “Good Variants of HB+ Are Hard to Find, Financial Cryptography and Data Security”, 12th International Conference, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers, pp. 156-170, Berlin, Heidelberg, Springer-Verlag, 2008.
8. Krishan, S.K., and Jingde, C., “A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions”, Proceedings of International Conference on Information Security and Assurance, pp. 342-349, Washington, DC, USA, 2008.
9. Ouafi, K., Overbeck, R., and Vaudenay, S., “On the Security of HB against a Man-in-the-Middle Attack”, Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, pp. 108-124, Berlin, Heidelberg, Springer-Verlag, 2008.
10. Dimitriou, T., “A Secure and Efficient RFID Protocol that Could Make big Brother (Partially) Obsolete”, Pervasive Computing and Communications, Fourth Annual IEEE International Conference, pp. 275, March, 2006.
11. EPCglobal, “EPC Generation 1 Tag Data Standards”, Standard Specifications, EPCglobal, May, 2005.