A Novel Security Method For RFID Tags
Keywords: RFID Security, RFID Attacks, Cloning Attack, Lightweight Security Method.
Mehran University Research Journal of Engineering & Technology
Volume 31 , Issue 3
Imran Ali Jokhio , Sana Hoor Jokhio , Javed Ali Baloch ,
References
1. |
EPCglobal, “The EPCglobal Network”, 2004. http://
www.epcglobalinc.org/. (Last Accessed January 2012). |
2. |
EPCglobal, “EPCTM Radio-Frequency Identity
Protocols Class-1 Generation-2 UHF RFID Protocol
for Communications at 860 MHz - 960 MHz”, Standard,
January, 2005. |
3. |
Juels, A., and Stephen, A., “Weis. Defining Strong Privacy
for RFID”, ACM Transactons on Information Systems
Securiry, Volume 13, No. 1, pp. 1-23, 2009. |
4. |
Ronald, L., and Rivest, S.A., Weis, S.E.S., and Daniel,
W.E., “Security and Privacy Aspects of Low-Cost Radio
Frequency Identification Systems”, Security in Pervasive
Computing, Volume 2802, 2004 of Lecture Notes in
Computer Science, pp. 50-59. Springer Berlin/Heidelberg,
January, 2004. |
5. |
Mala, M., “Privacy for RFID Systems to Prevent
Tracking and Cloning”, International Journal of
Computer Science and Network Security, Volume 8,
No. 1, pp. 1-5, January, 2008. |
6. |
Domingo-Ferrer, J., Posegga, J., FrancescSebe, and Vicenc,
T., “Advances in Smart Cards”, Computer Network,
Volume 51, No. 9, pp. 2219-2222, 2007. |
7. |
Gilbert, H., Matthew, J.R., and YannickSeurin, “Good
Variants of HB+ Are Hard to Find, Financial
Cryptography and Data Security”, 12th International
Conference, Cozumel, Mexico, January 28-31, 2008.
Revised Selected Papers, pp. 156-170, Berlin, Heidelberg,
Springer-Verlag, 2008. |
8. |
Krishan, S.K., and Jingde, C., “A Comparative Study of
RFID Solutions for Security and Privacy: POP vs.
Previous Solutions”, Proceedings of International
Conference on Information Security and Assurance,
pp. 342-349, Washington, DC, USA, 2008. |
9. |
Ouafi, K., Overbeck, R., and Vaudenay, S., “On the Security
of HB against a Man-in-the-Middle Attack”, Proceedings
of the 14th International Conference on the Theory
and Application of Cryptology and Information Security,
pp. 108-124, Berlin, Heidelberg, Springer-Verlag, 2008. |
10. |
Dimitriou, T., “A Secure and Efficient RFID Protocol
that Could Make big Brother (Partially) Obsolete”,
Pervasive Computing and Communications, Fourth
Annual IEEE International Conference, pp. 275,
March, 2006. |
11. |
EPCglobal, “EPC Generation 1 Tag Data Standards”,
Standard Specifications, EPCglobal, May, 2005. |
|
|
|