Articolul precedent |
Articolul urmator |
156 0 |
SM ISO690:2012 ȚÎFLEA, Denisa-Ionela. Vulnerabilities of LRSAS Protocol. In: Electronics, Communications and Computing, Ed. 12, 20-21 octombrie 2022, Chişinău. Chișinău: Tehnica-UTM, 2023, Editia 12, pp. 147-152. DOI: https://doi.org/10.52326/ic-ecco.2022/SEC.07 |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Electronics, Communications and Computing Editia 12, 2023 |
||||||
Conferința "Electronics, Communications and Computing" 12, Chişinău, Moldova, 20-21 octombrie 2022 | ||||||
|
||||||
DOI:https://doi.org/10.52326/ic-ecco.2022/SEC.07 | ||||||
Pag. 147-152 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
The construction of secure and private RFID protocols is necessary with the increasing application of RFID technology in increasingly diverse fields. While security refers to unilateral or mutual authentication depending on the protocol, privacy is a more elaborate concept to which many studies and research have been dedicated. Unfortunately, many RFID protocols are still being developed without consistent security and privacy analysis in well-defined models, such as the Vaudenay model. In this paper, we aim to prove that a recently proposed authentication protocol, LRSAS, does not achieve any form of privacy in Vaudenays model. |
||||||
Cuvinte-cheie RFID system, Security, Privacy |
||||||
|
Dublin Core Export
<?xml version='1.0' encoding='utf-8'?> <oai_dc:dc xmlns:dc='http://purl.org/dc/elements/1.1/' xmlns:oai_dc='http://www.openarchives.org/OAI/2.0/oai_dc/' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd'> <dc:creator>Țîflea, D.</dc:creator> <dc:date>2023</dc:date> <dc:description xml:lang='en'><p>The construction of secure and private RFID protocols is necessary with the increasing application of RFID technology in increasingly diverse fields. While security refers to unilateral or mutual authentication depending on the protocol, privacy is a more elaborate concept to which many studies and research have been dedicated. Unfortunately, many RFID protocols are still being developed without consistent security and privacy analysis in well-defined models, such as the Vaudenay model. In this paper, we aim to prove that a recently proposed authentication protocol, LRSAS, does not achieve any form of privacy in Vaudenays model.</p></dc:description> <dc:source>Electronics, Communications and Computing (Editia 12) 147-152</dc:source> <dc:subject>RFID system</dc:subject> <dc:subject>Security</dc:subject> <dc:subject>Privacy</dc:subject> <dc:title>Vulnerabilities of LRSAS Protocol</dc:title> <dc:type>info:eu-repo/semantics/article</dc:type> </oai_dc:dc>