The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Um protocolo de digitalização de grupo RFID permite que um leitor RFID produza uma prova de coexistência de múltiplas etiquetas RFID. Este tipo de protocolo também é conhecido como prova de junção, prova de agrupamento e prova de coexistência. Nesta carta, mostramos que todos os protocolos de varredura de grupo anteriores são vulneráveis a ataques de retransmissão.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Duc Nguyen DANG, Kwangjo KIM, "On the Security of RFID Group Scanning Protocols" in IEICE TRANSACTIONS on Information,
vol. E93-D, no. 3, pp. 528-530, March 2010, doi: 10.1587/transinf.E93.D.528.
Abstract: A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E93.D.528/_p
Copiar
@ARTICLE{e93-d_3_528,
author={Duc Nguyen DANG, Kwangjo KIM, },
journal={IEICE TRANSACTIONS on Information},
title={On the Security of RFID Group Scanning Protocols},
year={2010},
volume={E93-D},
number={3},
pages={528-530},
abstract={A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack.},
keywords={},
doi={10.1587/transinf.E93.D.528},
ISSN={1745-1361},
month={March},}
Copiar
TY - JOUR
TI - On the Security of RFID Group Scanning Protocols
T2 - IEICE TRANSACTIONS on Information
SP - 528
EP - 530
AU - Duc Nguyen DANG
AU - Kwangjo KIM
PY - 2010
DO - 10.1587/transinf.E93.D.528
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E93-D
IS - 3
JA - IEICE TRANSACTIONS on Information
Y1 - March 2010
AB - A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack.
ER -