Download now Free registration required
The private RFID authentication scheme by Molva and Di Pietro uses a non-cryptographic element for private identification. Through an exhaustive analysis of this element the authors have found multiple unintended features, flaws and attack vectors in the scheme. Based on this analysis they describe a set of design flaws and offer some remedies for them. RFIDs, also called tags, are small electronic devices that are currently used in the supply chain to monitor the movement of goods. They can be remotely read by an RFID-reader by use of radio waves, without line-of sight. RFIDs are mostly passive, that is, they are powered by the reader's energy field.
- Format: PDF
- Size: 178 KB