Access Restriction

Author Piramuthu, Selwyn
Source CiteSeerX
Content type Text
File Format PDF
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Tag-level Constraint ♦ Radio-frequency Identification ♦ Several Protocol ♦ Secure Rfid Tag Reader Authentication ♦ Lightweight Authentication Protocol ♦ Past Year ♦ Hb Protocol ♦ Valid Reader ♦ Adversary Pretend
Description Lightweight authentication protocols are necessary in Radio-Frequency Identification (RFID) applications due to tag-level constraints. Over the past few years, several such protocols have been proposed and analyzed. We focus on the HB protocol and its variants. We show the vulnerability of some of these to attacks on tags, where the adversary pretends to be a valid reader, and propose a modified protocol that avoids this type of attack. 1
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Learning Resource Type Article
Publisher Date 2006-01-01
Publisher Institution In CollECTeR 2006