Research on Security Analysis of RFID Based on Multiple Readers

Article Preview

Abstract:

The specialties and limitation of RFID system and device will incur lots of security problems especially when the system contains a lot of tags and many readers,the traditional methods become helpless. Here we present and analyze an improved hash key technique based on multiple readers.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2298-2302

Citation:

Online since:

February 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] ZHOU Yong-Bin FENG Deng-Guo Design and Analysis of Cryptographic Protocols for RFID. [J] CHINESE JOURNAL OF COMPUTERS , 2006, (04).

Google Scholar

[2] RIEBACKMR, CRISPO B, TANENBAUM AS. The evolution of RFID security [J]. IEEE Pervasive Computing, 2006, 5 (1) : 62 -69.

DOI: 10.1109/mprv.2006.17

Google Scholar

[3] Weis S.A. , Sarma S. E. , Rivest R.L. , Engels D. W. . Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter D. , Müller G. , Stephan W. , Ullmann M. eds. . Proceedings of the 1st International Conference on Security in Pervasive Computing. Lectures Notes in Computer Science 2802. Berlin: Springer-Verlag , 2004 , 201~212.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[4] SU Wei, CUI Zhe, WANG Xiao-jing, Research on Hash chain-based RFID privacy enhancement tag [J], Computer Applications , 2006, (10).

Google Scholar

[5] Frank Thornton,Syngress RFID Security(2006)[M]Canada :Syngress Publishing, (2006).

DOI: 10.1016/b978-159749056-6/50021-6

Google Scholar

[6] Sarma S. E. , Weis S. A. , Engels D. W. . Radio-frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes , 2003 , 6(1) : 2~9.

Google Scholar

[7] Sarma S. E. , Weis S. A. , Engels D. W. . RFID systems and security and privacy implications. In: Kaliski B. S. , Koc C.K. , Paar C. eds. . Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES2002 ). Lectures Notesin Computer Science 2523. Berlin: Springer-Verlag, 2003 , 454~469.

DOI: 10.1007/3-540-36400-5_33

Google Scholar

[8] C. Castelluccia and G. Avoine, Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags, Proceedings of CARDIS 2006, LNCS 3928, 289-299, (2006).

DOI: 10.1007/11733447_21

Google Scholar

[9] Rhee K. , Kwak J. , Kim S. , Won D. . Challenge response based RFID authentication protocol for distributed database environment. In: Hutter D. , Ullmann M. eds. . Proceedings of the 2nd International Conference on Security in Pervasive Com putting( SPC 2005 ). Lectures Notes in Computer Science 3450. Berlin: Springer2Verlag, 2005 , 70~84.

DOI: 10.1007/978-3-540-32004-3_9

Google Scholar

[10] FinkenzelleK. RFID-Handbook, Fundamentals and Applications in Contactlcss Smart Cards and Identification(2nd Edition) . New York: Wiley and Sons。, (2003).

Google Scholar

[6] Sarma S. E. , Weis S. A. , Engels D. W. . Radio-frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes , 2003 , 6(1) : 2~9.

Google Scholar

[7] Sarma S. E. , Weis S. A. , Engels D. W. . RFID systems and security and privacy implications. In: Kaliski B. S. , Koc C.K. , Paar C. eds. . Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES2002 ). Lectures Notesin Computer Science 2523. Berlin: Springer-Verlag, 2003 , 454~469.

DOI: 10.1007/3-540-36400-5_33

Google Scholar

[8] C. Castelluccia and G. Avoine, Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags, Proceedings of CARDIS 2006, LNCS 3928, 289-299, (2006).

DOI: 10.1007/11733447_21

Google Scholar

[9] Rhee K. , Kwak J. , Kim S. , Won D. . Challenge response based RFID authentication protocol for distributed database environment. In: Hutter D. , Ullmann M. eds. . Proceedings of the 2nd International Conference on Security in Pervasive Com putting( SPC 2005 ). Lectures Notes in Computer Science 3450. Berlin: Springer2Verlag, 2005 , 70~84.

DOI: 10.1007/978-3-540-32004-3_9

Google Scholar

[10] FinkenzelleK. RFID-Handbook, Fundamentals and Applications in Contactlcss Smart Cards and Identification(2nd Edition) . New York: Wiley and Sons。, (2003).

Google Scholar