Mahdi R. Alagheband and Mohammad R. Aref Unified privacy analysis of new-found RFID authentication protocols Security and Communication Networks 6
Authentication protocols are essentially necessary for the Radio Frequency Identification (RFID) tags to guarantee privacy and security among them and the readers. This paper inspects privacy in the RFID systems. The paper highlighted the weaknesses of four new found RFID authentication protocols in formal privacy model. The authors proved that all of them suffer from the family of traceability attacks. Furthermore, the four improved protocols are proposed to prevent the mentioned attacks with formal analysis.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf