Mobility

Grobner Basis Attacks on Lightweight RFID Authentication Protocols

Download Now Free registration required

Executive Summary

Recently, RFID systems have attracted much attention due to their wide applications including inventory control, logistics, supply chain management, etc. Since communications in RFID systems are executed on public RF channels and any reader can get the tag's information easily, the systems without proper protection are vulnerable to eavesdropping, tracking, tag forgery, and cloning. These security and privacy problems prohibit more rapid and widespread deployments of RFID. To address these problems, numerous RFID authentication protocols have been suggested in various ways.

  • Format: PDF
  • Size: 424.36 KB