Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6885098 | Journal of Network and Computer Applications | 2014 | 8 Pages |
Abstract
In this paper, detailed requirements for RFID seeking are suggested. The first secure RFID seeking protocol is proposed, meeting all the given requirements. Its security is formally verified by using the AVISPA tool. The proposed protocol is server-less, lightweight, privacy-friendly to both RFID readers and tags, and is secure against common attacks such as eavesdropping, manipulating, replaying, tracing, Denial of Service (DoS), etc.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Wei Xie, Lei Xie, Chen Zhang, Qiang Wang, Jian Xu, Quan Zhang, Chaojing Tang,