Grobner Basis Attacks on Lightweight RFID Authentication Protocols

Recently, RFID systems have attracted much attention due to their wide applications including inventory control, logistics, supply chain management, etc. Since communications in RFID systems are executed on public RF channels and any reader can get the tag's information easily, the systems without proper protection are vulnerable to eavesdropping, tracking, tag forgery, and cloning. These security and privacy problems prohibit more rapid and widespread deployments of RFID. To address these problems, numerous RFID authentication protocols have been suggested in various ways.

Provided by: KIPS Topic: Mobility Date Added: Dec 2011 Format: PDF

Find By Topic