[go: up one dir, main page]

Won et al., 2008 - Google Patents

Strong authentication protocol for secure RFID tag search without help of central database

Won et al., 2008

Document ID
1629844424656591543
Author
Won T
Chun J
Lee D
Publication year
Publication venue
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing

External Links

Snippet

RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Similar Documents

Publication Publication Date Title
Cho et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
Duc et al. Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
Syamsuddin et al. A survey of RFID authentication protocols based on hash-chain method
Dimitriou rfidDOT: RFID delegation and ownership transfer made simple
Won et al. Strong authentication protocol for secure RFID tag search without help of central database
Cherneva et al. Serial-dependency grouping-proof protocol for RFID EPC Gen2 tags
Chun et al. RFID tag search protocol preserving privacy of mobile reader holders
Chien The study of RFID authentication protocols and security of some popular RFID tags
Chen et al. The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
Han et al. Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
Rahman et al. Lightweight protocol for anonymity and mutual authentication in RFID systems
Habibi et al. Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard
Abughazalah et al. Enhancing the key distribution model in the RFID-enabled supply chains
Shen et al. A novel anonymous RFID authentication protocol providing strong privacy and security
Yang Lightweight authentication protocol for mobile RFID networks
Syamsuddin et al. A survey on low-cost RFID authentication protocols
Gharooni et al. A confidential RFID model to prevent unauthorized access
KR101215155B1 (en) System for and method of protecting communication between reader and tag in rfid system
Morshed et al. Efficient mutual authentication protocol for radiofrequency identification systems
Kim et al. Untraceable and serverless RFID authentication and search protocols
KR101162626B1 (en) A secure and efficient method and RFID reader device of searching a RFID tag
Cai et al. Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains
Taqieddin et al. An enhanced EPC Gen2v2 RFID authentication and ownership management protocol
Shemaili et al. Smart RFID Security, Privacy and Authentication
Habibi et al. Cryptanalysis of two mutual authentication protocols for low-cost RFID