Abstract | ||
---|---|---|
The design of ultra-lightweight authentication protocols is imperative to the pervasive deployment of low-cost RFIDs. This paper examines the security of two well known ultra-lightweight authentication protocols (LMAP and M2AP) and the improved scheme. We demonstrate our efficient attacks on the protocols, and highlight the key weaknesses of the designs. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1145/1278901.1278916 | Operating Systems Review |
Keywords | Field | DocType |
ultra-lightweight rfid authentication protocol,rfid,desynchronization,key weakness,improved scheme,pervasive deployment,authentication,privacy,security,low-cost rfids,ultra-lightweight authentication protocol,efficient attack,authentication protocol | Authentication,Software deployment,Computer science,Computer security,Authentication protocol,Transmission protocol,Radio-frequency identification | Journal |
Volume | Issue | Citations |
41 | 4 | 36 |
PageRank | References | Authors |
2.36 | 4 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hung-Yu Chien | 1 | 1310 | 83.55 |
Chen-Wei Huang | 2 | 125 | 9.03 |