Research Article
Wide–Weak Privacy–Preserving RFID Authentication Protocols
443 downloads
@INPROCEEDINGS{10.1007/978-3-642-16644-0_23, author={Yong Lee and Lejla Batina and Dave Singel\^{e}e and Ingrid Verbauwhede}, title={Wide--Weak Privacy--Preserving RFID Authentication Protocols}, proceedings={Mobile Lightweight Wireless Systems. Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers}, proceedings_a={MOBILIGHT}, year={2012}, month={10}, keywords={Authentication Protocol Privacy Tracking Attack Elliptic Curve Cryptography RFID}, doi={10.1007/978-3-642-16644-0_23} }
- Yong Lee
Lejla Batina
Dave Singelée
Ingrid Verbauwhede
Year: 2012
Wide–Weak Privacy–Preserving RFID Authentication Protocols
MOBILIGHT
Springer
DOI: 10.1007/978-3-642-16644-0_23
Abstract
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Cryptographic techniques are commonly used to enable tag-to-server authentication while protecting privacy. Unfortunately, these algorithms and their corresponding implementations are difficult to adapt to the extreme conditions implied by the use of RFID. The extremely limited budget for energy and area do not allow the use of traditional cryptography.
Copyright © 2010–2024 ICST