원문정보
초록
영어
Nowaday, the worldwide applications of RFID technologies have contributed to the development of supply chain system. However, to be confronted with various security and privacy issues in lightweight RFID protocols, the security analysis of lightweight ownership transfer (OT) protocols has become an important task. First and foremost, the passive attacker can further break down the security and privacy of three new published lightweight RFID protocols. Subsequently, the proposed protocol is designed to prevent the traceability attacks. Then, it is significant for us to show how to prove strong forward untraceable and backward untraceable of the improved scheme in security model.
목차
1. Introduction
2. Related Work
3. Adversarial Model
4. Cryptanalysis of Two Protocols
4.1. Cryptanalysis of Kapoor et al.’s Protocol
4.2. Cryptanalysis of PLAP protocol
5. The Improvement of PLAP Protocol
5.1. The Formal Privacy Proof
5.2. The Comparisons of Performance Properties
5.3. The Comparisons of Performance Properties
6. Conclusion
Acknowledgements
References
