«Information Security Group Universit´ catholique de Louvain e Louvain-la-Neuve, Belgium Version October 13, 2015 Abstract. This document is the ...»
Bibliography on Security and Privacy in RFID Systems
Information Security Group
Universit´ catholique de Louvain
Version October 13, 2015
Abstract. This document is the printable and citable version of the online bibliography on security
and privacy in RFID systems, available at http://www.avoine.net/rﬁd/. The website is maintained by
the UCL’s Information Security Group (Belgium) headed by Gildas Avoine. This bibliography contains
references toward refereed scientiﬁc papers published in journals and conference proceedings, as well as technical reports and thesis. It is updated on an irregular basis depending on the ﬂow of papers published in the domain.
1. M. B. Abdelhalim, M. El-Mahallawy, M. Ayyad, and A. El-Mahallawy. Design and implementation of an encryption algorithm for use in RFID system. International Journal of RFID Security and Cryptography, 1:51–57, March 2012.
2. Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, and Mohammad Reza Aref. Cryptanalysis of two EPC-based RFID security schemes. In International ISC Conference on Information Security and Cryptology – ISCISC2015, pages 1–6. IEEE, September 2015.
3. Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, and Mohammad Reza Aref. Attacks and improvements on two new-found RFID authentication protocols. In International Symposium on Telecommunications – IST 2014, pages 1–6, July 2014.
4. Shahab Abdolmaleky, Shahla Atapoor, Mohammad Hajighasemlou, and Hamid Sharini. A strengthened version of a hash-based RFID server-less security scheme. Advances in Computer Science: an International Journal, 4(3):18–23, May 2015.
5. Srujana Adepwar and P. Swetha. Security solution for real time location systems using distance bounding.
International Journal of Technology and Engineering Science, 2(6):1933–1937, June 2014.
6. A. O. Afolabi, A. A. Atayero, P. Ajayi, and P. Wogu. Implementation of biometric RFID identiﬁcation system:
A case study of covenant university. Covenant University ePrint Repository, 2015.
7. Arjun Agarwal and Mala Mitra. RFID: Promises and Problems, April 2006.
8. Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, and Somitra Kumar Sanad- hya. On the security of two RFID mutual authentication protocols. In Workshop on RFID Security – RFID- Sec’13, Graz, Austria, July 2013.
9. Tanvi Agrawal, P.K. Biswas, and A.D. Raoot. An optimized query tree algorithm in RFID inventory tracking – a case study evidence. IJCSI International Journal of Computer Science Issues, 9(1):85–93, July 2012.
10. Isaac Agudo, Ruben Rios, and Javier Lopez. A privacy-aware continuous authentication scheme for proximitybased access control. Computers & Security, (0), May 2013.
11. Hadi Ahmadi and Reihaneh Safavi-Naini. Secure distance bounding veriﬁcation using physical-channel properties. arXiv.org, Computer Science, Cryptography and Security, 2013.
12. Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref. Desynchronization attack on RAPP ultralightweight authentication protocol. Cryptology ePrint Archive, Report 2012/490, 2012.
13. Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref. Recursive linear and diﬀerential cryptanalysis of ultralightweight authentication protocols. Cryptology ePrint Archive, Report 2012/489, 2012.
14. Manfred Aigner. Security in the Internet of Things. In Workshop on RFID Security – RFIDSec Asia’10, volume 4 of Cryptology and Information Security, Singapore, Republic of Singapore, February 2010. IOS Press.
15. Manfred Aigner and Martin Feldhofer. Secure Symmetric Authentication for RFID Tags. In Telecommunication and Mobile Computing – TCMC 2005, Graz, Austria, March 2005.
16. Qurat Ul Ain, Yusra Mahmood, Umar Mujahid, and Muhammad Najam-ul islam. Cryptanalysis of mutual ultralightweight authentication protocols: SASI and RAPP. In International Conference on Open Source Systems and Technologies – ICOSST 2014, pages 136–145, Lahore, Pakistan, December 2014.
17. Mete Akg¨ n, Ali Osman Bayrak, and Mehmet Ufuk Caˇlayan. Attacks and improvements to chaotic map-based u ¸g RFID authentication protocol. Security and Communication Networks, July 2015.
18. Mete Akgun and M. Ufuk Caglayan. Weaknesses of two RFID protocols regarding de-synchronization attacks.
In International Wireless Communications and Mobile Computing Conference IWCMC – 2015, Dubrovnik, Croatia, August 2015.
19. Mete Akg¨n and M. Ufuk Caˇlayan. On the security of recently proposed RFID protocols. Cryptology ePrint u ¸g Archive, Report 2013/820, 2013.
20. Mete Akg¨ n and M. Ufuk Caˇlayan. Providing destructive privacy and scalability in RFID systems using u ¸g PUFs. Ad Hoc Networks, February 2015.
21. Mete Akg¨n and Mehmet Caˇlayan. Extending an rﬁd security and privacy model by considering forward unu ¸g traceability. In Security and Trust Management, pages 239–254, Technical University of Denmark, Copenhagen, June 2011.
22. Mete Akg¨ n and Mehmet Ufuk Caˇlayan. Towards scalable identiﬁcation in RFID systems. Wireless Personal u ¸g Communications, August 2015.
23. Mahdi R. Alagheband and Mohammad R. Aref. Uniﬁed privacy analysis of new-found RFID authentication protocols. Security and Communication Networks, 5(12), December 2012.
24. Mahdi R. Alagheband and Mohammad R. Aref. Simulation-based traceability analysis of RFID authentication protocols. Wireless Personal Communications, December 2013.
25. Rima Hussin Embrak Alakrut, Azman Samsudin, and Alﬁn Syafalni. Provably lightweight RFID mutual authentication protocol. International Journal of Security and Its Applications, 7(4), July 2013.
26. Seyed Mohammad Alavi, Behzad Abdolmaleki, and Karim Baghery. Vulnerabilities and improvements on HRAP+, a hash-based RFID authentication protocol. Advances in Computer Science: an International Journal, 3(6):51–56, November 2014.
27. Seyed Mohammad Alavi, Karim Baghery, and Behzad Abdolmaleki. Security and privacy ﬂaws in a recent authentication protocol for EPC C1 G2 RFID tags. Advances in Computer Science : an International Journal, 3(5):44–52, September 2014.
28. Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki, and Mohammad Reza Aref. Traceability analysis of recent RFID authentication protocols. Wireless Personal Communications, pages 1–20, March 2015.
29. Hisham Khalaf Allahem. Mutual authentication scheme for mobile rﬁd systems. Master thesis, Dalhousie University, Halifax, Nova Scotia, Canada, March 2013.
30. Basel Alomair, Andrew Clark, Jorge Cuellar, and Radha Poovendran. Scalable RFID Systems: a PrivacyPreserving Protocol with Constant-Time Identiﬁcation. In the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – DSN’10, Chicago, Illinois, USA, June 2010. IEEE, IEEE Computer Society.
31. Basel Alomair, Andrew Clark, Jorge Cuellar, and Radha Poovendran. Scalable RFID systems: A privacypreserving protocol with constant-time identiﬁcation. IEEE Transactions on Parallel and Distributed Systems, 2011.
32. Basel Alomair, Loukas Lazos, and Radha Poovendran. Passive Attacks on a Class of Authentication Protocols for RFID. In Kil-Hyun Nam and Gwangsoo Rhee, editors, International Conference on Information Security and Cryptology – ICISC 2007, volume 4817 of Lecture Notes in Computer Science, pages 102–115, Seoul, Korea, November 2007. Springer.
33. Basel Alomair, Loukas Lazos, and Radha Poovendran. Securing Low-cost RFID Systems: an Unconditionally Secure Approach. Journal of Computer Security – Special Issue on RFID System Security, 2010.
34. Basel Alomair, Loukas Lazos, and Radha Poovendran. Securing Low-Cost RFID Systems: an Unconditionally Secure Approach. In Workshop on RFID Security – RFIDSec Asia’10, volume 4 of Cryptology and Information Security, Singapore, Republic of Singapore, February 2010. IOS Press.
35. Basel Alomair and Radha Poovendran. On the Authentication of RFID Systems with Bitwise Operations. In New Technologies, Mobility and Security – NTMS’08, pages 1–6, Tangier, Morocco, November 2008. IEEE, IEEE Computer Society.
36. Basel Alomair and Radha Poovendran. Eﬃcient Authentication for Mobile and Pervasive Computing. In Sihan Qing Miguel Soriano and Javier Lopez, editors, International Conference on Information and Communications Security – ICICS’10, volume 6476 of Lecture Notes in Computer Science, pages 186–202, Barcelona, Spain, December 2010. Springer.
37. Basel Alomair and Radha Poovendran. Privacy versus Scalability in Radio Frequency Identiﬁcation Systems.
Computer Communication, Elsevier, 2010.
38. Gergely Alpar, Lejla Batina, and Wouter Lueks. Designated attribute-based proofs for RFID applications. In Workshop on RFID Security – RFIDSec’12, Nijmegen, Netherlands, June 2012.
39. Abdulhadi Alqarni, Maali Alabdulhaﬁth, and Srinivas Sampalli. A proposed RFID authentication protocol based on two stages of authentication. In The 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks – EUSPN-2014, Halifax, Nova Scotia, Canada, September 2014.
40. George T. Amariucai, Cliﬀord Bergman, and Yong Guan. An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID. In Workshop on RFID Security – RFIDSec’11, Amherst, Massachusetts, USA, June 2011.
41. Myrto Arapinis, Tom Chothia, Eike Ritter, and Mark Ryan. Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. In Computer Security Foundations Symposium – CSF 2010, Edinburgh, United Kingdom, July 2010. IEEE.
42. Alex Arbit, Yoel Livne, Yossef Oren, and Avishai Wool. Implementing public-key cryptography on passive RFID tags is practical. International Journal of Information Security, April 2014.
43. Mohammad Arjmand, Mahmoud Gardeshi, Reza Taheri zohur, and Mohammad Kazemi. Providing a distance bounding protocol named pasargad in order to defend against relay attacks on RFID-based electronic voting system. International Journal of UbiComp, 2(3):69–82, 2011.
44. Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, and Christian Wachsmann. Anonymous Authentication for RFID Systems. In S.B. Ors Yalcin, editor, Workshop on RFID Security – RFIDSec’10, volume 6370 of Lecture Notes in Computer Science, pages 158–175, Istanbul, Turkey, June 2010. Springer.
45. Frederik Armknecht, Matthias Hamann, and Vasily Mikhalev. Lightweight authentication protocols on ultralightweight RFIDs – myths and facts. In Workshop on RFID Security – RFIDSec’14, Oxford, UK, July 2014.
46. Frederik Armknecht, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti, and Christian Wachsmann.
Impossibility Results for RFID Privacy Notions. Transaction on Computational Science XI, 6480:39–63, 2010.
47. Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann. On RFID Privacy with Mutual Authentication and Tag Corruption. In Jianying Zhou and Moti Yung, editors, Proceedings of the 8th International Conference on Applied Cryptography and Network Security – ACNS 2010, volume 6123 of Lecture Notes in Computer Science, pages 493–510, Beijing, China, June 2010. Springer.
48. Mahdi Asadpour and Mohammad Torabi Dashti. A privacy-friendly RFID protocol using reusable anonymous tickets. In 10th International Conference on Trust, Security and Privacy in Computing and Communications – TrustCom 2011, pages 206–213, November 2011.
49. Aisha Aseeri and Omaima Bamasak. HB-MP∗ :towards a man-in-the-middle-resistant protocol of HB family.
In 1st International Conference on Wireless Communications and Mobile Computing, page 4, Istanbul, Turkey, June 2011.
50. Giuseppe Ateniese, Jan Camenisch, and Breno de Medeiros. Untraceable RFID Tags via Insubvertible Encryption. In Vijay Atluri, Catherine Meadows, and Ari Juels, editors, Conference on Computer and Communications Security – ACM CCS’05, pages 92–101, Alexandria, Virginia, USA, November 2005. ACM, ACM Press.
51. Ali Atici, Lejla Batina, Benedikt Gierlichs, and Ingrid Verbauwhede. Power Analysis on NTRU Implementations for RFIDs: First Results. In Workshop on RFID Security – RFIDSec’08, Budapest, Hungary, July 2008.
52. Jean-Philippe Aumasson, Aikaterini Mitrokotsa, and Pedro Peris-Lopez. A note on a privacy-preserving distance-bounding protocol. In Sihan Qing, Willy Susilo, Guilin Wang, and Dongmei Liu, editors, International Conference on Information and Communications Security – ICICS’11, volume 2043 of Lecture Notes in Computer Science, pages 78–92. Springer Berlin / Heidelberg, November 2011.
53. Myo Min Aung, Yoon Seok Chang, and Jong-un Won. Emerging RFID/USN applications and challenges.
International Journal of RFID Security and Cryptography, 1:3–8, March 2012.
54. Gildas Avoine. Privacy Issues in RFID Banknote Protection Schemes. In Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, and Anas Abou El Kadam, editors, International Conference on Smart Card Research and Advanced Applications – CARDIS 2004, pages 33–48, Toulouse, France, August 2004. IFIP, Kluwer Academic Publishers.
55. Gildas Avoine. Adversary Model for Radio Frequency Identiﬁcation. Technical Report LASEC-REPORTSwiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland, September 2005.
56. Gildas Avoine. Cryptography in Radio Frequency Identiﬁcation and Fair Exchange Protocols. PhD thesis, EPFL, Lausanne, Switzerland, December 2005.
57. Gildas Avoine, Muhammed Ali Bingol, Xavier Carpent, and Suleyman Kardas. Deploying OSK on low-resource mobile devices. In Workshop on RFID Security – RFIDSec’13, Graz, Austria, July 2013.
58. Gildas Avoine, Muhammed Ali Bing¨l, Xavier Carpent, and Sıddıka Berna Ors Yal¸ın. Privacy-friendly autheno c tication in RFID systems: On sub-linear protocols based on symmetric-key cryptography. IEEE Transactions on Mobile Computing, 12(10):2037–2049, October 2013.