Skip to main content
select distinct n.content as name, r.content as role, t.nameID as nameID, n.unitID as unitID, n.departmentID as departmentID, n.facultyID as facultyID, n.provinceID as provinceID, n.countryID as countryID from transaction as t, Name as n, Role as r where t.itemID='160850' and t.nameID=n.id and t.roleID=r.id
scopus



Performance comparison of the Authentication protocols in RFID system

Researcher

เครือข่ายคณะผู้วิจัย


เครือข่ายนักวิจัย+ผลงานวิจัย (full screen)

Abstract

Radio frequency identification (RFID) is a technology for Automated identification, which consists of a reading device, a server and RFID tags. We are interested in Authentication protocols where two tags are simultaneously scanned by an RFID reader. Although there are several Authentication protocols proposed in literature, some of them are insecure. This paper analyses the security of the Authentication protocols based on two possible attacks: the Brute-force attack against the Proof and the forgery attack by using an authorised reader interacting with RFID tags. We also evaluate these protocols in terms of Computation costs, Communication costs and the resources used by adversary to run the attack (e.g., the size of memories and the number of queries). The results from our analysis indicate that our proposed protocol is more secure than the others and provides a countermeasure against forgery attack. Copyright © 2010 ACM.

Radio frequency identification (148 items found) | Automated identification (1 items found) | Authentication protocol (5 items found) | Communication cost (7 items found) | Brute-force attack (1 items found) | Computation costs (10 items found) | Authentication (138 items found) | Proof (5 items found) | RFID (214 items found) | RFID tagsAuthentication protocols | Performance comparison | Radio navigation | Forgery attacks | Cryptography | RFID readers | RFID systems | Ecosystems | RF-ID tags |

ต้นฉบับข้อมูล : scopus