Academic
Publications
RFID Systems and Security and Privacy Implications

RFID Systems and Security and Privacy Implications,10.1007/3-540-36400-5_33,Sanjay E. Sarma,Stephen A. Weis,Daniel W. Engels

RFID Systems and Security and Privacy Implications   (Citations: 252)
BibTex | RIS | RefWorks Download
The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes. We describe RFID technology, summarize our ap- proach and our research, and most importantly, describe the research opportunities in RFID for experts in cryptography and information se- curity. The common theme in low-cost RFID systems is that computation resources are very limited, and all aspects of the RFID system are con- nected to each other. Understanding these connections and the resulting design trade-offs is an important prerequisite to effectively answering the challenges of security and privacy in low-cost RFID systems.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...For the case of 13.56 MHz, i.e., the maximum frequency of HF RFID applications, the core dissipates 130 W at 0.65 V This value is far below the predictions given in [39] 500 W . In RFID systems,thevoltageisoftenaffectedbythedistancebetweenreader and tag [40]...

    Luca Henzenet al. VLSI Characterization of the Cryptographic Hash Function BLAKE

    • ...At present, cryptography based secure protocol has been designed, and especially the hash-based protocol is concerned, for example: Hash-Lock protocol [5], randomized Hash-Lock protocol [6], Hash-Chain protocol [7], Challenge-response based RFID authentication protocol [3], Hash-Based ID Variation protocol [8], LCAP [11] and so on. There are also other non-hash based protocols, such as re-encryption protocol, lightweight block cipher ...

    Jiezhong Gonget al. A secure authentication protocol for RFID based on Trivium

    • ...Techniques such as Hash Locks [12] and Blocker Tags [13] require very little from tags, pushing the processing onto the reader or a separate tag...

    Paul Krieret al. Cloaking RFID tags

    • ...They can be solved if the appropriate cryptographic mechanism is applied during communication between the tag and reader [4], [6]-[8]...
    • ...In this process, communication between the tag and reader has the following characteristics [3], [4], [7], [8]...
    • ...• User privacy violation [3], [4], [8] : The adversary can analyze the output value of a specific RFID tag and acquire the attached object information, which can be used to violate the user’s personal privacy...
    • ...• Location privacy violation [3], [4], [8] : Since a tag has always a unique unchangeable output value, the location of the user can be traced...

    Jung-Sik Choet al. RFID System Security Analysis, Response Strategies and Research Direct...

    • ...1. the physics of building tags and readers [11], [29], 2. the techniques required to guarantee privacy and safety [6], [14], [30], 3. the software architecture required to collect, filter, organize, and answer online queries on tags known as the “EPC Global Network,” which is defined by several standards including [2], [10], [26], [28], [32],...

    Hector Gonzalezet al. Modeling Massive RFID Data Sets: A Gateway-Based Movement Graph Approa...

Sort by: