Vulnerabilities of RFID protocols proposed in ISF
Selwyn Piramuthu ()
Additional contact information
Selwyn Piramuthu: University of Florida
Information Systems Frontiers, 2012, vol. 14, issue 3, No 13, 647-651
Abstract:
Abstract RFID (Radio Frequency IDentification) tags are increasingly being incorporated in a wide variety of applications despite the absence of completely secure authentication protocols. While this is acceptable in some applications, there is an urgent need to address vulnerabilities in existing protocols to develop better, non-vulnerable protocols. Not surprisingly, this continues to be a very active area for research and development. Recently, the Information Systems Frontiers Journal published two papers dealing with RFID authentication protocols. The protocols introduced in these papers, however, are vulnerable to attacks from an active adversary. We identify some existing vulnerabilities in these authentication protocols.
Keywords: RFID; Cryptography; Protocol (search for similar items in EconPapers)
Date: 2012
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (2)
Downloads: (external link)
http://link.springer.com/10.1007/s10796-010-9291-8 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:infosf:v:14:y:2012:i:3:d:10.1007_s10796-010-9291-8
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/10796
DOI: 10.1007/s10796-010-9291-8
Access Statistics for this article
Information Systems Frontiers is currently edited by Ram Ramesh and Raghav Rao
More articles in Information Systems Frontiers from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().