RFID protocol evaluation using Bayesian networks

RFID is a technology concept that allows collecting data automatically at high speeds, which is appealing to many industries, but the introduction of this technology brings many technological and information processing specific obstacles with it. This paper describes a method that offers a systematic approach for evaluating communication protocols which are sensitive in means of information security in different environments.

[1]  Hartmut Pohl,et al.  RFID security , 2004, Inf. Secur. Tech. Rep..

[2]  Dong Hoon Lee,et al.  Efficient RFID Authentication Protocol for Ubiquitous Computing Environment , 2005, EUC Workshops.

[3]  Mike Burmester,et al.  RFID Security : Attacks , Countermeasures and Challenges , 2007 .

[4]  Egils Ginters,et al.  Security problems of RFID authentication protocols , 2007 .

[5]  Julien Bringer,et al.  HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[6]  Tim Kerins,et al.  Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[7]  Yingjiu Li,et al.  Protecting RFID communications in supply chains , 2007, ASIACCS '07.