期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Security analysis of two recently proposed RFID authentication protocols
1
作者 Chao LV Hui LI +1 位作者 Jianfeng MA Meng ZHAO 《Frontiers of Materials Science》 SCIE CSCD 2011年第3期335-340,共6页
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authe... Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol successfully, the adversary may execute a series of carefully designed challenges to determine the tag's identification. 展开更多
关键词 radio frequency identification (RFID) protocol tag information leakage untraceability attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部