Abstract
Using RFID tags can simplify many applications and provide many benefits, but the privacy of the customers should be taken into account. A potential threat for the privacy of a user is that anonymous readers can obtain information about the tags in the system. In order to address the security issues of RFID systems, various schemes have been proposed. Among the various solutions, lightweight protocols have attracted much attention as they are more appropriate for the limited architecture of RFID tags. In this paper, we perform the security analysis of five lightweight protocols proposed in [1-4] and discuss their advantages and security issues. The computational complexity of these lightweight protocols are also compared in this work. © 2011 Springer-Verlag.
Cite
CITATION STYLE
Vahedi, E., Ward, R. K., & Blake, I. F. (2011). Security analysis and complexity comparison of some recent lightweight RFID protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6694 LNCS, pp. 92–99). https://doi.org/10.1007/978-3-642-21323-6_12
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.