作者: Dong-Guk Han , Tsuyoshi Takagi , Ho Won Kim , Kyo Il Chung
DOI: 10.1007/11751595_41
关键词: Information system 、 Radio-frequency identification 、 Confidentiality 、 Cryptographic primitive 、 Hash chain 、 Adversary model 、 Computer security 、 Challenge response 、 Computer science 、 Denial-of-service attack 、 Cryptography
摘要: Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology provide benefits without threatening privacy of consumers. Using cryptographic primitives thwart security problems an approach which has been explored several years. In this paper, we introduce a problem called as “Tag Killing” aims wipe out functioning system, e.g., denial service attacks. We analyze well-known protocols are considered good solutions with adversary model and show most them have weaknesses vulnerable it.