Won et al., 2008 - Google Patents
Strong authentication protocol for secure RFID tag search without help of central databaseWon et al., 2008
- Document ID
- 1629844424656591543
- Author
- Won T
- Chun J
- Lee D
- Publication year
- Publication venue
- 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
External Links
Snippet
RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID …
- 239000000243 solution 0 description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Cho et al. | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | |
| Duc et al. | Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning | |
| Syamsuddin et al. | A survey of RFID authentication protocols based on hash-chain method | |
| Dimitriou | rfidDOT: RFID delegation and ownership transfer made simple | |
| Won et al. | Strong authentication protocol for secure RFID tag search without help of central database | |
| Cherneva et al. | Serial-dependency grouping-proof protocol for RFID EPC Gen2 tags | |
| Chun et al. | RFID tag search protocol preserving privacy of mobile reader holders | |
| Chien | The study of RFID authentication protocols and security of some popular RFID tags | |
| Chen et al. | The design of RFID access control protocol using the strategy of indefinite-index and challenge-response | |
| Han et al. | Mutual authentication protocol for RFID tags based on synchronized secret information with monitor | |
| Rahman et al. | Lightweight protocol for anonymity and mutual authentication in RFID systems | |
| Habibi et al. | Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard | |
| Abughazalah et al. | Enhancing the key distribution model in the RFID-enabled supply chains | |
| Shen et al. | A novel anonymous RFID authentication protocol providing strong privacy and security | |
| Yang | Lightweight authentication protocol for mobile RFID networks | |
| Syamsuddin et al. | A survey on low-cost RFID authentication protocols | |
| Gharooni et al. | A confidential RFID model to prevent unauthorized access | |
| KR101215155B1 (en) | System for and method of protecting communication between reader and tag in rfid system | |
| Morshed et al. | Efficient mutual authentication protocol for radiofrequency identification systems | |
| Kim et al. | Untraceable and serverless RFID authentication and search protocols | |
| KR101162626B1 (en) | A secure and efficient method and RFID reader device of searching a RFID tag | |
| Cai et al. | Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains | |
| Taqieddin et al. | An enhanced EPC Gen2v2 RFID authentication and ownership management protocol | |
| Shemaili et al. | Smart RFID Security, Privacy and Authentication | |
| Habibi et al. | Cryptanalysis of two mutual authentication protocols for low-cost RFID |