Skip to main content

Showing 1–2 of 2 results for author: Ahmed, E G

.
  1. Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

    Authors: Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem

    Abstract: Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low c… ▽ More

    Submitted 25 May, 2010; originally announced May 2010.

    Comments: 11 Pages, IJNSA

    Journal ref: International Journal of Network Security & Its Applications 2.2 (2010) 27-37

  2. arXiv:1004.1237   

    cs.CR

    Lightweight Distance bound Protocol for Low Cost RFID Tags

    Authors: Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem

    Abstract: Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a prom… ▽ More

    Submitted 7 May, 2010; v1 submitted 7 April, 2010; originally announced April 2010.

    Comments: Results in paper questionable. Article withdrawn by authors.

    Journal ref: IJCSIS, Vol. 7 No. 3, March 2010