Konferans bildirisi Açık Erişim

Weaknesses of Two RFID Protocols Regarding De-synchronization Attacks

Akgun, Mete; Caglayan, M. Ufuk


Dublin Core

<?xml version='1.0' encoding='utf-8'?>
<oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
  <dc:creator>Akgun, Mete</dc:creator>
  <dc:creator>Caglayan, M. Ufuk</dc:creator>
  <dc:date>2015-01-01</dc:date>
  <dc:description>Radio Frequency Identification (RFID) protocols should have a secret updating phase in order to protect the privacy of RFID tags against tag tracing attacks. In the literature, there are many lightweight RFID authentication protocols that try to provide key updating with lightweight cryptographic primitives. In this paper, we analyze the security of two recently proposed lightweight RFID authentication protocol against de-synchronization attacks. We show that secret values shared between the back-end server and any given tag can be easily desynchronized. This weakness stems from the insufficient design of these protocols.</dc:description>
  <dc:identifier>https://aperta.ulakbim.gov.trrecord/100763</dc:identifier>
  <dc:identifier>oai:zenodo.org:100763</dc:identifier>
  <dc:rights>info:eu-repo/semantics/openAccess</dc:rights>
  <dc:rights>http://www.opendefinition.org/licenses/cc-by</dc:rights>
  <dc:title>Weaknesses of Two RFID Protocols Regarding De-synchronization Attacks</dc:title>
  <dc:type>info:eu-repo/semantics/conferencePaper</dc:type>
  <dc:type>publication-conferencepaper</dc:type>
</oai_dc:dc>
19
6
görüntülenme
indirilme
Görüntülenme 19
İndirme 6
Veri hacmi 1.1 kB
Tekil görüntülenme 19
Tekil indirme 6

Alıntı yap