RFID (Radio Frequency IDentification) tags are increasingly being incorporated in a wide variety of applications despite the absence of completely secure authentication protocols. While this is acceptable in some applications, there is an urgent need to address vulnerabilities in existing protocols to develop better, non-vulnerable protocols. Not surprisingly, this continues to be a very active area for research and development. Recently, the Information Systems Frontiers Journal published two papers dealing with RFID authentication protocols. The protocols introduced in these papers, however, are vulnerable to attacks from an active adversary. We identify some existing vulnerabilities in these authentication protocols.
机构:
Univ Hong Kong, E Business Technol Inst, Hong Kong, Hong Kong, Peoples R ChinaUniv Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
Luo, Zongwei
;
Wong, Edward C.
论文数: 0引用数: 0
h-index: 0
机构:
Univ Hong Kong, E Business Technol Inst, Hong Kong, Hong Kong, Peoples R ChinaUniv Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
机构:
Univ Hong Kong, E Business Technol Inst, Hong Kong, Hong Kong, Peoples R ChinaUniv Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
Luo, Zongwei
;
Wong, Edward C.
论文数: 0引用数: 0
h-index: 0
机构:
Univ Hong Kong, E Business Technol Inst, Hong Kong, Hong Kong, Peoples R ChinaUniv Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China