Learn More
In this paper, we present a synchronization-based communication protocol for RFID devices. We focus on the EPCGlobal Class-1 Gen-2 RFID tag which supports only simple cryptographic primitives like Pseudo-random Number Generator (PRNG) and Cyclic Redundancy Code (CRC). Our protocol is secure in a sense that it prevents the cloned tags and malicious readers(More)
Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a ubiquitous infrastructure. However, current low-cost RFID tags are highly resource-constrained and cannot support its long-term security, so they have potential risks and may violate privacy for their bearers. To remove security(More)
In this whitepaper, we present a synchronization-based communication protocol for EPCGlobal Class-1 Gen-2 RFID devices. The Class-1 Gen-2 RFID tag supports only simple cryptographic primitives like Pseudo-random Number Generator (PRNG) and Cyclic Redundancy Code (CRC). Our protocol is secure in a sense that it prevents the cloned tags and malicious readers(More)
RFID(Radio Frequency Identification) is now being used in everything for economic feasibility and convenience. In contrast, RFID tags may infringe on user’s privacy. A number of previous schemes exploiting hash function, symmetric cryptographic primitive like AES (Advanced Encryption Standard), asymmetric cryptographic primitive like ECC (Elliptic Curve(More)
Group key management presents a fundamental challenge in secure dynamic group communications. In this paper, we propose an efficient group authenticated key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure(More)
In wireless sensor networks (WSNs), broadcast authentication allows only legitimate users (or senders) to disseminate messages into the networks. μTESLA [14] is the first broadcast authentication scheme for WSNs. It allows only few users, mainly several base stations, to broadcast messages, but in reality there are many scenarios that require a large number(More)
The research on the security of RFID (Radio Frequency Identification) has occupied the attention. Most of previous research results focus on the security and privacy between a RFID tag and a reader. However, the research on the security between a reader and a back-end server leaves much to be desired. And moreover The standard parties of RFID reader(More)