Radio Frequency Identification : Adversary Model and Attacks on Existing Protocols

@inproceedings{Avoine2005RadioFI,
  title={Radio Frequency Identification : Adversary Model and Attacks on Existing Protocols},
  author={Gildas Avoine},
  year={2005}
}
Radio Frequency Identification (RFID) systems aim to identify objects in open environments with neither physical nor visual contact. They consist of transponders inserted into objects, of readers, and usually of a database which contains information about the objects. The key point is that authorised readers must be able to identify tags without an adversary being able to trace them. Traceability is often underestimated by advocates of the technology and sometimes exaggerated by its detractors… CONTINUE READING
Highly Cited
This paper has 75 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 53 extracted citations

On a New Formal Proof Model for RFID Location Privacy (Extended Version)

IACR Cryptology ePrint Archive • 2008
View 9 Excerpts
Highly Influenced

Untraceability Model for RFID

IEEE Transactions on Mobile Computing • 2014
View 5 Excerpts

76 Citations

01020'07'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 76 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 29 references

Security parallels between people and pervasive devices

Third IEEE International Conference on Pervasive Computing and Communications Workshops • 2005
View 5 Excerpts
Highly Influenced

Privacy and security in library RFID: issues, practices, and architectures

ACM Conference on Computer and Communications Security • 2004
View 5 Excerpts
Highly Influenced

Security and privacy in radio-frequency identification

Stephen Weis
2003
View 5 Excerpts
Highly Influenced

A scalable and provably secure hash-based RFID protocol

Third IEEE International Conference on Pervasive Computing and Communications Workshops • 2005
View 4 Excerpts

Grouping proof for RFID tags

19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers) • 2005
View 3 Excerpts

RFID Traceability: A Multilayer Problem

Financial Cryptography • 2005
View 4 Excerpts

Similar Papers

Loading similar papers…