Security and privacy on authentication protocol for low-cost RFID

8Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Radio Frequency Identification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called RFID tag. Even though RFID system is widely used for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect the users from tracing and also to support Low-cost RFID, we propose an authentication protocol which can be adopted for read-only RFID tag using XOR computation and Partial ID concept. The proposed protocol is secure against reply attacking, eavesdropping, and spoofing attacking so that avoiding the location privacy exposure. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Li, Y. Z., Cho, Y. B., Um, N. K., & Lee, S. H. (2007). Security and privacy on authentication protocol for low-cost RFID. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4456 LNAI, pp. 788–794). Springer Verlag. https://doi.org/10.1007/978-3-540-74377-4_82

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free