Abstract | ||
---|---|---|
This paper presents a survey on several RFID authentication protocols under
low cost restrictions. Low cost RFID are mainly addressed with limited security
and privacy protections. In this study, we explore several protocols with
various authentication mechanisms found in literature that satisfy low cost
restrictions. Assessments of these protocols are based on data protection,
tracking protection, forward security. Finally, it is concluded that no single
low cost RFID protocol fully meets the requirement of the given assessments.
While a protocol satisfies one or two assessments, it fails to fully meet the
requirement of the third assessment. This study provides a new insight in RFID
literature which can be used particularly by small and medium industries to
choose the appropriate RFID protocol for their needs. |
Year | Venue | Keywords |
---|---|---|
2010 | Advanced Computer Science and Information Systems | cryptographic protocols,data privacy,radiofrequency identification,telecommunication security,rfid privacy,rfid security,data protection,forward security,low cost limitation,low cost restriction,low-cost rfid authentication protocols,privacy protections,radio frequency identification,tracking prevention,rfid,low cost,privacy,security,authentication protocol,satisfiability |
Field | DocType | Volume |
Data security,Authentication,Computer security,Computer science,Computer network,Security service,Forward secrecy,Authentication protocol,Cloud computing security,Data Protection Act 1998,Privacy software | Journal | abs/1009.3 |
ISBN | Citations | PageRank |
978-1-4673-3026-8 | 2 | 0.42 |
References | Authors | |
14 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
irfan syamsuddin | 1 | 2 | 0.42 |
song han | 2 | 2 | 0.42 |
Vidyasagar Potdar | 3 | 303 | 35.24 |
Tharam S. Dillon | 4 | 2 | 0.42 |