Upload
dangnhan
View
215
Download
0
Embed Size (px)
Citation preview
AN INTEGRITY BASED RADIO FREQUENCY IDENTIFICATION
(RFID) METHOD AGAINST REPLAY ATTACK
SEYED MOSTAFA MIR HOSSEINI
UNIVERSITI TEKNOLOGI MALAYSIA
………………………………
………………………………
………………………………
“I hereby declare that I have read this project, in my
opinion this project report is sufficient in terms of scope and quality for the
award of the degree of Master of Computer Science (Information Security).”
Signature :
Name of Supervisor : DR. Mazdak Zamani
Date : May 2013
AN INTEGRITY BASED RADIO FREQUENCY IDENTIFICATION
(RFID) METHOD AGAINST REPLAY ATTACK
SEYED MOSTAFA MIR HOSSEINI
A thesis submitted in partial fulfillment of
the requirements for the award of the degree of
Master of Computer Science (Information Security)
Advanced Informatics School
Universiti Teknologi Malaysia
MAY 2013
ii
………………………………
………………………………
………………………………
I declare that this project report entitled “An Integrity Based Radio Frequency
Identification (RFID) Method Against Replay Attack” is the result of my own research
except as cited in the references. The project report has not been accepted for any
degree and is not concurrently submitted in the candidature of any other degree.
Signature :
Name : Seyed Mostafa Mirhosseini
Date : May 2013
iv
ACKNOWLEDGEMENT
First, thank you Allah for giving me strength to take up this challenge and with
your blessing to complete this study. Second and foremost, i am deeply indebted to my
supervisor, Dr. Mazdak Zamani for his patience in assisting, advising and guiding me
throughout this project. Special thanks to my examiners, Associate Professor Dr. Mohd
Shahidan Abdullah and PM Dr Salwani Daud for their comments and critics that make
this study more comprehensive and precious. To the admin staff of UTM AIS, thank
you for your continuous help and kind assistance during my presence in UTM AIS.
To my family, a million thanks for your understanding and ardent support
extended to me throughout my journey to accomplish this study. Last but not least i
want to thank all of my friends especially all my dear classmate who helped and
understood me during this project.
v
ABSTRACT
Radio Frequency Identification (RFID) is a new in technology field. This
emerging technology has been use in different applications. RFID systems have their
own security challenges and this research is going to explore integrity attacks in RFID
systems. Even though the previous related works have their own strength and
weaknesses. The two factor authentication based method is proposed to prevent Replay
attacks. In this method, necessary processes are mentioned, tag and the reader two
factor authentication by using a security token and integrity would be guaranteed. It
can prevent replay attack in RFID systems through using TOTP. In this additional
security step legitimate and fake tag will be recognized. Integrity of tag information
will be achieved. In addition, Replay attack is prevented by implementing one time
password token. The significant attack such as Replay attack, Tracking attack, MITM
attack, Spoofing attack, Impersonation, Cloning, Tampering, Forgery attacks can be
achieved when attacker cannot generate a one-time password. This integrity based
RFID method can be used in access control to prevent unauthorized access.
vi
ABSTRAK
Radio Frequency Identification (RFID) adalah satu perkara yang baru dalam
bidang teknologi. Teknologi baru ini telah digunakan dalam aplikasi yang berbeza.
Sistem RFID mempunyai cabaran-cabaran keselamatan mereka sendiri dan kajian ini
akan meneroka serangan integriti dalam sistem RFID. Walaupun kerja-kerja yang
berkaitan sebelum ini mempunyai kekuatan sendiri dan kelemahan mereka.Kedua-dua
faktor kaedah berasaskan pengesahan adalah dicadangkan untuk mencegah serangan
Ulangan. Dalam kaedah ini, proses yang perlu disebut, tag dan pembaca dua faktor
pengesahan dengan menggunakan tanda keselamatan dan integriti akan dijamin. Ia
boleh mencegah serangan ulangan dalam sistem RFID melalui menggunakan TOTP.
Dalam kes ini, langkah keselamatan tambahan tag sah dan palsu akan diiktiraf. Integriti
maklumat tag akan tercapai. Di samping itu, serangan Ulangan dihalang dengan
melaksanakan token kata laluan satu-satu masa. Serangan penting seperti serangan
Ulangan, serangan Penjejakan, serangan MITM, serangan Menipu, Penyamaran,
Pengklonan, Mengganggu, serangan Pemalsuan boleh dicapai apabila penyerang tidak
boleh menjana kata laluan satu masa. Ini berasaskan kaedah RFID integriti boleh
digunakan untuk mencegah dan menghalang akses capaian yang tidak dibenarkan.
vii
TABLE OF CONTENT
CHAPTER TITLE PAGE
DECLARATION ii
DEDICATION iii
ACKNOWLEDGEMENTS iv
ABSTRACT v
ABSTRAK vi
TABLE OF CONTENTS vii
LIST OF TABLES x
LIST OF FIGURES xi
LIST OF ABBREVIATIONS xiii
1 INTRODUCTION 1
1.1 Overview 1
1.2 Background of the Problem 2
1.3 Problem Statement 2
1.4 Research Questions 3
1.5 Project Objectives 3
1.6 Project Aim 4
1.7 Project Scope 4
2 LITERATURE REVIEW 6
2.1 Wireless Technology 6
2.1.1 Wi-Fi 7
2.1.2 Bluetooth 8
2.1.3 RFID 8
2.2 RFID Component 9
viii
2.2.1 Active Tag 12
2.2.2 Passive Tag 13
2.2.3 Semi-Active Tag 15
2.2.4 Scanners And Readers 16
2.2.5 Antennas 17
2.2.6 Host 18
2.2.7 RFID Adoption Phases 20
2.2.8 Challenges To RFID Adoption 21
2.3 Classification OF RFID Attack 25
2.3.1 Physical Layer 26
2.3.2 Network Transport Layer 28
2.3.3 Application Layer 29
2.3.4 Strategic Layer 30
2.3.5 Multi-Layer Attacks 32
2.4 Related Works 35
2.4.1 Hash Lock and Randomized Hash Lock 35
2.4.2 PRNG Operation 39
2.4.3 XOR Operation 42
2.4.4 Encryption Technique 43
2.4.5 Zero Knowledge Formulation 47
2.5 One Time Password 54
2.5.1 Mathematical Algorithms Method 55
2.5.2 Time-Synchronized Method 56
2.5.3 Time Based One-Time-Password 56
3 RESEARCH METHODOLOGY 57
3.1 Introduction 57
3.2 Investigation of Current Methods 58
3.3 To Propose a Method 58
3.4 To Evaluate The Proposed Method 59
3.5 Summary of Deliverables 60
4 DESIGN AND IMPLEMENTATION 61
4.1 Introduction 61
ix
4.1.1 TOTP Algorithm Design Description 63
4.2 Method Design Overview 65
4.2.1 Tag And Reader Connection 66
4.2.2 Back-End Server 66
4.2.3 User Side 68
4.2.4 Attacker Side 69
4.3 Implementation 70
5 RESULT AND DISCUSSION 79
5.1 Introduction 79
5.2 Suggested RFID Method 80
5.3 Result Evaluation 81
5.3.1 Simulation RFID Attack 1 81
5.3.2 Simulation RFID Attack 2 92
5.4 Analytical Comparison 98
5.4.1 Doss et al. Solution Analysis 98
5.4.2 Moessner and Khan Solution Analysis 98
5.4.3 Doss and Zhou Solution Analysis 99
5.4.4 Ning et al. Solution Analysis 100
5.4.5 Di Pietro and Molva Solution Analysis 100
5.4.6 Doss et al. Solution Analysis 101
5.4.7 Ning et al. Solution Analysis 102
5.4.8 Yang et al. Solution Analysis 103
5.4.9 Liu and Ning Solution Analysis 103
5.5 Summary 104
6 CONCLUSION AND FUTURE WORKS 107
6.1 Introduction 107
6.2 Project Summary and Conclusion 109
6.3 Contribution and Related Achievements 109
6.4 Future Works 110
REFRENCES 111
Appendices A-B 115-116
x
LIST OF TABLES
TABLE NO. TITLE PAGE
2.1 Technical Differences Between Barcode and RFID (Wiberg, 2009) 9
2.2 Frequency band. (Wu et al., 2006) 11
2.3 The RFID Implementation Process(Cheung et al., 2010) 21
2.4 Preview of RFID attacks in Literature Review 48
3.1 Summary Of Deliverables 60
5.1 Telnet Command 87
5.2 Method Result 92
5.3 Method Result 105
xi
LIST OF FIGURES
FIGURE NO. TITLE PAGE
1.1 Research scenario overview 4
2.1 Components of a RFID tag (Wiberg, 2009) 10
2.2 Components Of An Active Tag (Wiberg, 2009) 12
2.3 Components Of A Passive Tag (Wiberg, 2009) 14
2.4 Tag’s Price Prediction (Wiberg, 2009) 15
2.5 Components Of A Semi-Active Tag ( Wiberg, 2009) 15
2.6 Logical components of RFID (Wiberg, 2009). 18
2.7 Layers of RFID Communication 25
2.8 Classification of RFID attacks (Mitrokotsa, Rieback, & Tanenbaum,
2010) 26
2.9 Multi-Layer Attacks 32
2.10 Doss et al. (2012) Scheme 38
3.1 Operational Framework 57
3.2 Investigation Phase 58
3.3 Proposed Method Phase 59
3. 4 Proposed Method Phase 59
4.1 Steps for RFID method 63
4.2 TOTP Algorithm Design Description 64
4.3 Tag And Reader Connection 66
4.4 Back-End Server Side 67
4.5 TOTP Sent 68
4.6 TOTP Back To Server 68
4.7 Attacker Side 69
4.8 Prevent Replay Attack 70
4.9 Method Overview 70
xii
4.10 TOTP Method Implementation Overview 71
4.11 TOTP Method Implementation Description 71
4.12 Unix Time 72
4.13 Timestamp 73
4.14 Check The Value 73
4.15 Result Message 74
4.16 Numeric keypad 75
4.17 Log File 76
4.18 Result Part 77
4.19 Attack Sample 78
5.1 RFID integrity based method 80
5.2 Rifidi 82
5.3 Starting a Virtual Reader 83
5.4 Select the reader 84
5.5 Supply the reader's IP and port 85
5.6 Start on the reader to begin 85
5.7 Tag creation wizard 86
5.8 Tags on an Antenna 87
5.9 RawCap Dump File 88
5.10 RawCap screen 89
5.11 Wireshark 90
5.12 Simulation Method 91
5.13 RFDump Live 93
5.14 Rifidi Emulator 94
5.15 virtual serial ports 95
5.16 VMware Workstation 96
5.17 Rfdump Attack 96
5.18 Attack Diagram 97
5.19 Legitimate User and Attacker Condition 104
6.1 Schematic Method 108
xiii
LIST OF ABBREVIATION
C1G2 - Class 1 Generation 2
DCAP - Dual Cryptography Authentication Protocol
DDOS - Distributed Denial-Of-Service
DoS - Denial of Service
EPC - Electronic Product Code
FAR - False Acceptance Rate
FPGA - Field-Programmable Gate Array
FRR - False Rejection Rate
HMAC Keyed-Hashing for Message Authentication
HTTP - Hypertext Transfer Protocol
KAAP - Key Array Authentication Protocol
OTP - One Time Password
PAM - Pluggable Authentication Modules
PRNG - Pseudorandom Number Generators
PUF - Physical Unclonable Function
RFID - Radio Frequency Identification
RNG - Pseudorandom Number Generators
ROC - Receiver Operating Characteristic
ROI - Return On Investment
SAPCC1G2 - Secure Authentication Protocol Conforming To EPC C1G2
xiv
SSL - Transport Layer Security
TOPT - Time-based One-time Password
ZKAP - Zero-Knowledge Authentication Protocol
1
CHAPTER 1
1 INTRODUCTION
1.1 Overview
Wireless telecommunications is the transfer of information between two or
more points that are not physically connected. Distances can be short, such as a few
meters of the television remote control, or as far as thousands or even millions of
kilometers for deep-space radio communications. It encompasses various types of
fixed, mobile, and portable two-way radios, cellular telephones, personal digital
assistants, and wireless networking(Shelly et al., 2011).
Radio Frequency Identification (RFID) is one type of wireless network that
classify in short range wireless. RFID networks exist in a broad range of environments
and their rapid proliferation has been underway for quite some time. RFID systems
consist of tiny integrated circuits equipped with antennas (RFID tags), that
communicate with their reading devices (RFID readers) using electromagnetic fields
at one of several standard radio frequencies. Additionally, there is usually a back-end
database that collects information related to the physically tagged objects (Song &
Mitchell, 2008).
2
1.2 Background of the Problem
Radio Frequency Identification (RFID) is the use of a wireless non-contact
system that uses radio-frequency electromagnetic fields to transfer data from a tag
attached to an object, for the purposes of automatic identification and tracking. Unlike
a bar code, the tag does not need to be within line of sight of the reader and may be
embedded in the tracked object (Hua and Hong, 2012).
RFID tags are used in many industries. Since RFID tags can be attached to
clothing, possessions, or even implanted within people, the possibility of reading
personally-linked information without consent has raised security concerns (Hua and
Hong, 2012).
Not only vital information privacy, protection solutions, detection the risks and
threats are the popular issues in RFID technique but also authentication through the
insecure wireless channel and data integrity are the sensitive challenges.
Tag and reader are two critical items of RFID because they are vulnerable to
the threat of data counterfeiting. On the other hand read and write and alter the data
will be occurred without any permit that is a big threat for the user. People’s important
belongings should be protected against modification.
Although the above problems do not cover all concerns about this technology,
but from the security point of view, data integrity and modification are the important
problems that should be considered.
1.3 Problem Statement
A common defense approach to attacks is the use of a previous response
protocol. RFID tags and readers usually share a secret and use a challenge response
protocol to authenticate their identities. Nevertheless, very often this approach is
3
subject to Replay attacks. In a Replay attack, an adversary broadcasts a tag’s response
recorded from a past transaction in order to impersonate the tag to a reader. Typical
example of this attack is the unauthorized access to restricted areas by broadcasting an
exact Replay of the radio signal sent from a legitimate tag to the reader that grants
access (van Deursen and Radomirović, 2009).
There are some attacks on RFID like Replay attack and cloning attack that
focus on integrity of RFID, In replay attack an adversary can repeated previous
transaction to impersonate the tag to the reader (Replay attack) that compromise
integrity which is a big problem in information security .This research will focus on
Replay attack and will try to provide a solution against it.
1.4 Research Questions
Research questions related to this project is listed as below:
What are the available current RFID attack and techniques had been used?
Why RFID is affected by Replay attack?
How we can improve security?
1.5 Project Objectives
During this project to achieve the aim the following step is intended:
To identify current attacks on RFID and investigate existing technique
against these attacks
4
To propose a new method to prevent Replay attack on Rfid
To test and evaluate proposed method by creating simulation attacks
1.6 Project Aim
The main contribution of my study is developing a method against replay
attack. in following paper, there is implementation a method for increase security on
RFID base on one time password as shown in Figure 1.1.
Figure 1.1 : Research scenario overview
1.7 Project Scope
The scope of this study focuses on the integrity of data transmission between
tags and readers in RFID technology .In RFID three concepts should be considered:
Wireless
Wi-fiBluetooth
RFID
ConfidentialityAvailability
Integrity
ColeningReplay attack
One-time Password
5
Confidentiality, Integrity, and Availability (CIA). Therefore attacks can be divided by
the CIA.
Eavesdropping, unauthorized tag reading, and privacy threats are several
attacks that influence confidentiality in authentication and communication sector.
Traceability and collection of personal information are the privacy threat’s
capabilities. DDOS attack and Dos attack are threats that can influence Availability.
Replay attack and cloning attack are threats that influence integrity. The scope explains
the identification of significant security threats and their solutions to prevent
information modification and integrity issues.
In following this research focus on one time password and use TOTP to prevent
common attacks and finally proposed method will be evaluated in simulation
environment.
111
7 REFERENCES
Ahson, S. A. and Ilyas, M. (2008). RFID handbook: applications, technology, security,
and privacy: CRC.
Attaran, M. (2007). RFID: an enabler of supply chain operations. Supply Chain Management:
An International Journal, 12(4), 249-257 .
Burmester, M., De Medeiros, B., Munilla, J. and Peinado, A. (2009). Secure EPC Gen2
compliant radio frequency identification. Proceedings of the 2009 8th International
Conference on Ad-Hoc, Mobile and Wireless Networks, ADHOC-NOW 2009,
September 22, 2009 - September 25, 20 19 Murcia, Spain, 227-240.
Chen, X., Su, Y., Xiong, H., Yao, Y., Liu, G. and Yue, M. (2010). An improved authentication
approach to enhance security and privacy in RFID system. Proceedings of the 2010
2010 2nd International Conference on Intelligent Human-Machine Systems and
Cybernetics, IHMSC 2010, August 26, 2010 - August 28, 2010 Nanjing, China, 217-
220.
Cheung, W., Chu, S.-C. and Du, T. C. (2010). Three Phases RFID Adoption: A Road Map to
Success .
Di Pietro, R. and Molva, R. (2011). An optimal probabilistic solution for information
confinement, privacy, and security in RFID systems. Journal of Network and
Computer Applications, 34(3), 853-863. doi: 10.1016/j.jnca.2010.04.015
Doss, R., Sundaresan, S. and Zhou, W. (2013). A practical quadratic residues based scheme
for authentication and privacy in mobile RFID systems. Ad Hoc Networks, 11(1), 383-
396. doi: 10.1016/j.adhoc.2012.06.015
Doss, R. and Zhou, W. (2012). A secure tag ownership transfer scheme in a closed loop RFID
system. Proceedings of the 20 12 2112 IEEE Wireless Communications and
Networking Conference Workshops, WCNCW 2012, April 1, 2012 - April 1, 2012
Paris, France, 164-169.
Doss, R., Zhou, W., Sundaresan, S., Yu, S. and Gao, L. (2012). A minimum disclosure
approach to authentication and privacy in RFID systems. Computer Networks, 56(15),
3401-3416. doi: 10.1016/j.comnet.2012.06.018
Doss, R., Zhou, W., Yu, S. and Gao, L. (2011). A novel mutual authentication scheme with
minimum disclosure for RFID systems. Proceedings of the 2011 2011 7th International Conference on Intelligent Sensors, Sensor Networks and Information
Processing, ISSNIP 2011, December 6, 2011 - December 9, 2011 Adelaide, SA,
Australia, 544-549.
Gao, H. D., Guo, Y. J., Cui, J. Q., Hao, H. G. and Shi, H. (2012). A communication protocol
of RFID systems in internet of things. International Journal of Security and its
Applications, 6(2), 91-102 .
112
Gong, J., Chen, G., Li, L. and Li, J. (2011). A secure authentication protocol for RFID based
on Trivium. Proceedings of the 2011 2 111 International Conference on Computer
Science and Service System, CSSS 2011, June 27, 2011 - June 29, 2011 Nanjing,
China, 107-109.
Hua, L. and Hong, X. (2012). Application of apparel network customization based on the
Internet of Things. Proceedings of the 2012 Computer Science & Education (ICCSE),
2012 7th International Conference on, 888-892.
Huey, K. J., Ismail, W. and Rahman, M. G. (2011). Fingerprint-based mutual authentication
RFID protocol. Proceedings of the 2011 2011 IEEE International Conference on
Signal Processing, Communications and Computing, ICSPCC 2011, September 14,
2011 - September 16, 2011 Xi'an, China, IEEE Xi'an Section; IEEE Hong Kong
Section; Northwestern Polytechnical University; Xidian University; Xi'an Jiaotong
University.
Jialiang, H., Dantong, O. and Haiyan, W. (2012). A RFID authentication protocol with index
inner table used in reader. International Journal of Digital Content Technology and
its Applications, 6(2), 119-127. doi: 10.4156/jdcta.vol6.issue2.15
Jin, Y., Xin, W ,.Sun, H. and Chen, Z. (2012). PUF-based RFID authentication protocol
against secret key leakage. Proceedings of the 2012 14th Asia Pacific Web Technology
Conference, APWeb 2012, April 11, 2012 - April 13, 2012 Kunming, China, 318-329.
Jones, E. C. and Chung, C. A. (2007). RFID in logistics: a practical introduction: CRC.
Khor, J. H., Ismail, W. and Rahman, M. G. (2012). Prevention and detection methods for
enhancing security in an RFID system. International Journal of Distributed Sensor
Networks, 2012 .doi: 10.1155/2012/891584
Kim, C.-J., Yun, S.-Y. and Park, S.-C. (2010). A lightweight ECC algorithm for mobile RFID
service. Proceedings of the 2010 5th International Conference on Ubiquitous
Information Technologies and Applications, CUTE 2010, December 16 ,2111 -
December 18, 2010 Sanya, China ,
Lai, Y.-C. and Lin, C.-C. (2011). Secure coexistence proofs for RFID tags. ICIC Express
Letters, 5(4 B), 1441-1448 .
Lee, K. (2010). A two-step mutual authentication protocol based on randomized hash-lock for
small RFID networks. Proceedings of the 2010 4th International Conference on
Network and System Security, NSS 2010, September 1, 2010 - September 3, 2010
Melbourne, VIC, Australia, 527-533.
Li, J.-S. and Liu, K.-H. (2011). A hidden mutual authentication protocol for low-cost RFID
tags. International Journal of Communication Systems, 24(9), 1196-1211. doi:
10.1002/dac.1222
Lien, Y.-H., Leng, X., Mayes, K. E. and Chiu, J.-H. (2011). Select-response grouping proof
and its verification protocol for RFID tags. International Journal of Intelligent
Information and Database Systems, 5(2), 101-118. doi: 10.1504/ijiids.2011.038967
Liu, H. and Ning, H. (2011). Zero-knowledge authentication protocol based on alternative
mode in RFID systems. IEEE Sensors Journal, 11(12 ,)3235-3245 . doi:
10.1109/jsen.2011.2160052
Luo, J. N. and Yang, M. H. (2012). Mobile RFID mutual authentication and ownership
transfer. International Journal of Advancements in Computing Technology, 4(7), 28-
40. doi: 10.4156/ijact.vol4.issue7.4
113
M’Raihi ,D., Bellare, M., Hoornaert, F., Naccache, D. and Ranen, O. (2005). Hotp: An hmac-
based one-time password algorithm. The Internet Society, Network Working Group.
RFC4226 .
Macari, J. (2012). Wireless Internet/Technology, 2012, from
http://www.uri.edu/personal/jmac7019/FinalWebpage.htm
Mitrokotsa, A., Rieback, M. R. and Tanenbaum, A. S. (2010). Classification of RFID attacks.
Gen, 15693, 14443 .
Moessner, M. and Khan, G. N. (2012). Secure authentication scheme for passive C1G2 RFID
tags. Computer Networks ,56(1 ,)273-286 . doi: 10.1016/j.comnet.2011.09.008
Morshed, M. M., Atkins, A. and Yu, H.-N. (2012). An efficient and secure authentication
protocol for RFID systems. International Journal of Automation and Computing, 9(3),
257-265. doi: 10.1007/s11633-012 -1642-4
Najafi, V., Jenabi, M., Mohammadi, S., Fotowat-Ahmady, A. and Marvasti, M. B. (2008). A
dual mode EPC Gen 2 UHF RFID transponder in 0.18 μm CMOS. Proceedings of the
2008 Electronics, Circuits and Systems, 2008. ICECS 2008. 15th IEEE International Conference on, 1135-1138.
Ning, H., Liu, H., Mao, J. and Zhang, Y. (2011). Scalable and distributed key array
authentication protocol in radio frequency identification-based sensor systems. IET
Communications, 5(12), 1755-1768. doi: 10.1049/iet-com.2010.0625
Ning, H., Liu, H. and Yang, C. (2011). Ultralightweight RFID authentication protocol based
on Random partitions of pseudorandom identifier and pre-shared secret value. Chinese
Journal of Electronics, 20(4), 701-707 .
Ning, H., Liu, H., Yang, L. T. and Zhang, Y. (2012). Dual cryptography authentication
protocol and its security analysis for radio frequency identification systems.
Concurrency Computation Practice and Experience, 24(17), 2040-2054. doi:
10.1002/cpe.1827
Quan, Q., Xiang, G. and Rui, Z. (2 111.) RFID protocol based on random number and
encryption hash. Proceedings of the 2011 IET International Communication
Conference on Wireless Mobile and Computing, CCWMC 2011, November 14, 2011
- November 16, 2011 Shanghai, China, 169-174.
Rong, J. and Huang, S. (2011). SAPCC1G2: A mutual authentication protocol promote the
security of RFID and WSN integration system. International Journal of
Communication Networks and Distributed Systems, 7(3-4), 249-261. doi:
10.1504/ijcnds.2011.042378
Shang-Ping, W ,.Qiao-Mei, M., Ya-Ling, Z. and You-Sheng, L. (2011). An Authentication
Protocol for RFID Tag and its Simulation. Journal of Networks, 6(3), 446-453. doi:
10.4304/jnw.6.3.446-453
Shao, S., Xu, G. and Liu, Y. (2011). Efficient RFID authentication scheme with high security.
Proceedings of the 2011 2011 IEEE 3rd International Conference on Communication
Software and Networks, ICCSN 2011, May 27, 2011 - May 29, 2011 Xi'an, China,
238-241.
Shelly, G. B., Gunter, G. A. and Gunter, R. E. (2011). Teachers discovering computers: Course
Technology Ptr.
van Deursen, T. and Radomirović, S. (2009). Algebraic attacks on RFID protocols.
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and
Ubiquitous Networks, 38-51 .
114
Wang, S.-P., Ma, Q.-M., Zhang, Y.-L. and Li, Y.-S. (2010). A HMAC-based RFID
authentication protocol. Proceedings of the 2010 2nd International Symposium on
Information Engineering and Electronic Commerce, IEEC2010, July 23, 2010 - July
25, 2010 Ternopil, Ukraine, 66-69.
Wiberg, M ( .2119 .) Exploring an open-loop RFID implementation in the automotive industry:
Division of Packaging Logistics, Lund University.
Wu, N. C., Nystrom, M., Lin, T. R. and Yu, H. C. (2006). Challenges to global RFID adoption.
Technovation, 26(12), 1317-1323 .
Yang, M. H. (2010). Controlled delegation protocol in mobile RFID networks. Eurasip
Journal on Wireless Communications and Networking, 2010. doi:
10.1155/2010/170150
Yao, Q., Qi, Y., Chen, Y. and Zhong, X. (2010). A desynchronization tolerant RFID private
authentication protocol. Proceedings of the 2010 5th International Conference on
Wireless Algorithms, Systems, and Applications, WASA 2010, August 15, 2010 -
August 17, 2010 Beijing, China, 120-124.