New security problem in RFID systems "Tag Killing"

14Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as "Tag Killing" which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with "Tag Killing" adversary model and we show that most of them have weaknesses and are vulnerable to it. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Han, D. G., Takagi, T., Kim, H. W., & Chung, K. I. (2006). New security problem in RFID systems “Tag Killing.” In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3982 LNCS, pp. 375–384). Springer Verlag. https://doi.org/10.1007/11751595_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free