E-mail

E-mail a Wiley Online Library Link

Mahdi R. Alagheband and Mohammad R. Aref Unified privacy analysis of new-found RFID authentication protocols Security and Communication Networks 6

Article first published online: 17 DEC 2012 | DOI: 10.1002/sec.650

Thumbnail image of graphical abstract

Authentication protocols are essentially necessary for the Radio Frequency Identification (RFID) tags to guarantee privacy and security among them and the readers. This paper inspects privacy in the RFID systems. The paper highlighted the weaknesses of four new found RFID authentication protocols in formal privacy model. The authors proved that all of them suffer from the family of traceability attacks. Furthermore, the four improved protocols are proposed to prevent the mentioned attacks with formal analysis.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

Choose captcha format: Image or Audio. Click here if you need help.

SEARCH