Security analysis and complexity comparison of some recent lightweight RFID protocols

22Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Using RFID tags can simplify many applications and provide many benefits, but the privacy of the customers should be taken into account. A potential threat for the privacy of a user is that anonymous readers can obtain information about the tags in the system. In order to address the security issues of RFID systems, various schemes have been proposed. Among the various solutions, lightweight protocols have attracted much attention as they are more appropriate for the limited architecture of RFID tags. In this paper, we perform the security analysis of five lightweight protocols proposed in [1-4] and discuss their advantages and security issues. The computational complexity of these lightweight protocols are also compared in this work. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Vahedi, E., Ward, R. K., & Blake, I. F. (2011). Security analysis and complexity comparison of some recent lightweight RFID protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6694 LNCS, pp. 92–99). https://doi.org/10.1007/978-3-642-21323-6_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free