<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232008000200001</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Desing and Implementation of a Security Layer for RFID Systems]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Alarcon-Aquino]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Domínguez-Jiménez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ohms]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidad de las Américas Puebla Cholula Department of Computing, Electronics, and Mechatronics ]]></institution>
<addr-line><![CDATA[Cholula Puebla]]></addr-line>
<country>MEXICO</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Fachhochschule Kiel Department of Information Technology and Electronics ]]></institution>
<addr-line><![CDATA[Kiel ]]></addr-line>
<country>GERMANY</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2008</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2008</year>
</pub-date>
<volume>6</volume>
<numero>2</numero>
<fpage>69</fpage>
<lpage>82</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232008000200001&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232008000200001&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232008000200001&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[RFID (Radio Frequency Identification) is a technology whose employment will certainly grow in the following years. It is therefore necessary to consider the security issues that come out from the implementation of that type of systems. In this paper we present an approach to solve the security problems in RFID systems by designing a naive security layer based on authentication and encryption algorithms. The authentication mechanism is the mutual authentication based on a three-way handshaking model, which authenticates both the reader and the tag in the communication protocol. The cipher algorithm based on a symmetric-key cryptosystem is RC4 implemented in a proposed modification to the existing WEP protocol to make it more secure in terms of message privacy. The proposed approach is implemented using VHDL in FPGAs communicated through RF transceivers. The results show that the security layer is simple enough to be implemented in a low-price RFID tag.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[RFID]]></kwd>
<kwd lng="en"><![CDATA[security layer]]></kwd>
<kwd lng="en"><![CDATA[encryption]]></kwd>
<kwd lng="en"><![CDATA[authentication]]></kwd>
<kwd lng="en"><![CDATA[FPGA]]></kwd>
<kwd lng="en"><![CDATA[WEP]]></kwd>
<kwd lng="en"><![CDATA[RC4]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>Desing and Implementation of a Security Layer for RFID Systems</b></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>V. Alarcon&#45;Aquino<sup>1</sup>, M. Dom&iacute;nguez&#45;Jim&eacute;nez, C. Ohms<sup>2</sup></b></font></p>      <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><i>Department of Computing, Electronics, and Mechatronics Universidad de las Am&eacute;ricas Puebla Cholula, Puebla, MEXICO</i> <a href="mailto:vicente.alarcon@udlap.mx">vicente.alarcon@udlap.mx</a></font></p>  	    <p align="justify"><font face="verdana" size="2"><i><sup>1</sup> Department of Information Technology and Electronics Fachhochschule Kiel Kiel, GERMANY</i></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>ABSTRACT</b></font></p>  	    <p align="justify"><font face="verdana" size="2">RFID (Radio Frequency Identification) is a technology whose employment will certainly grow in the following years. It is therefore necessary to consider the security issues that come out from the implementation of that type of systems. In this paper we present an approach to solve the security problems in RFID systems by designing a naive security layer based on authentication and encryption algorithms. The authentication mechanism is the mutual authentication based on a three&#45;way handshaking model, which authenticates both the reader and the tag in the communication protocol. The cipher algorithm based on a symmetric&#45;key cryptosystem is RC4 implemented in a proposed modification to the existing WEP protocol to make it more secure in terms of message privacy. The proposed approach is implemented using VHDL in FPGAs communicated through RF transceivers. The results show that the security layer is simple enough to be implemented in a low&#45;price RFID tag.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Keywords:</b> RFID, security layer, encryption, authentication, FPGA, WEP, RC4.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><a href="../pdf/jart/v6n2/v6n2a1.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b> REFERENCES</b></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; Weis, A. S., Security and Privacy in Radio&#45;Frequency Identification Devices, Master Thesis. MIT, 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844931&pid=S1665-6423200800020000100001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; Garfinkel, S., A. Juels and R. Pappu., RFID Privacy: An Overview of Problems and Proposed Solutions, IEEE Security &amp; Privacy. May/June 2005, pp. 34&#45;43</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844933&pid=S1665-6423200800020000100002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; Landt, J., The History of RFID, IEEE Potentials, October/November, 2005, pp. 8&#45;11</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844934&pid=S1665-6423200800020000100003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; Feldhofer, M., A Proposal for an Authentication Protocol in a Security Layer for RFID Smart Tags, Institute for Applied Information Processing and Communications &#45;Graz University of Technology, Austria. February 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844935&pid=S1665-6423200800020000100004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; Juels, A, RFID Security and Privacy: A Research Survey, IEEE Journal on Selected Areas in Communications, Vol. 24, Issue 2, , February 2006, pp. 381&#45;394</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844937&pid=S1665-6423200800020000100005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; Peris&#45;Lopez, P., Hernandez&#45;Castro, J. C., Estevez&#45;Tapiador, J. M., and Ribagorda, A., RFID Systems: A Survey on Security Threats and Proposed Solutions, in 11th IFIP International Conference on Personal Wireless Communications &#150; PWC06, LNCS 4217, Springer, 2006, pp. 159&#45;170</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844938&pid=S1665-6423200800020000100006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; Rotter, P., A Framework for Assessing RFID System Security and Privacy Risks, IEEE Pervasive Computing, Vol. 7, No. 2, April&#45;June 2008, pp. 70&#45;77</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844939&pid=S1665-6423200800020000100007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; Hassan, H. R., and Challal, Y., Enhanced WEP: An Efficient Solution to WEP Threats, IEEE 2nd IFIP International Conference on Wireless and Optical Communications Networks, WOCN 2005, March 2005, pp. 594&#45;599</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844940&pid=S1665-6423200800020000100008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; Purandare, D. S., Enhancing Message Privacy in WEP, Master Thesis, Department of Computer Science, University of Central Florida, USA, 2005.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844941&pid=S1665-6423200800020000100009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; Finkenzeller, K., RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd. ed. Trad. Rachel Waddington. West Sussex: John Wiley &amp; Sons Ltd., 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844943&pid=S1665-6423200800020000100010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; Oppliger, R., Authentication Systems for Secure Networks. Massachusetts: Artech House, 1996.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844945&pid=S1665-6423200800020000100011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; Muftic, S., Security Mechanisms for Computer Networks. West Sussex: Ellis Horwood Limited, 1989.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844947&pid=S1665-6423200800020000100012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; Purser, M., Secure Data Networking. Massachusetts: Artech House, 1996.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844949&pid=S1665-6423200800020000100013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; F&uacute;ster, A., T&eacute;cnicas Criptogr&aacute;ficas de Protecci&oacute;n de Datos, 2nd. ed. Mexico: Alfaomega, 2001.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844951&pid=S1665-6423200800020000100014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; Stinson, D., Cryptography &#45; Theory and Practice, Chapman &amp; HALL/CRC, 2002.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844953&pid=S1665-6423200800020000100015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; Myers, J., RFC 2222: Simple Authentication and Security Layer (SASL), October 1997. Status: Proposed Standard. Updated by RFC2444.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844955&pid=S1665-6423200800020000100016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;17&#93; L. R. Knudsen, W. Meier., B. Preneel., V. Rijmen and S. Verdoolaege, Analysis Methods for (Alleged) RC4, LNCS 1514, Springer&#45;Verlag, Berlin, Germany, ASIACRYPT 1998, pp. 327&#45;341.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844957&pid=S1665-6423200800020000100017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;18&#93; Kitsos, P., Kostopoulos, G., Sklavos, N., Koufopavlou, O. Hardware Implementation of the RC4 Stream Cipher, in Proceedings of the 46th IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 03, Vol. 3, December, 2003, pp. 1363&#45;1366.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844959&pid=S1665-6423200800020000100018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;19&#93; H&auml;m&auml;l&auml;inen, P., H&auml;nnik&auml;inen, M., H&auml;m&auml;l&auml;inen, T., Saarinen, J., Hardware Implementation of the Improved WEP and RC4 Encryption Algorithm for Wireless Terminals, the European Signal Processing Conference (EUSIPCO 2000), 2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844961&pid=S1665-6423200800020000100019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;20&#93; Galanis, M., Kitsos, P., Kostopoulos, G., Sklavos, N., Goutis, C., Comparison of the Hardware Implementation of Stream Ciphers, The International Arab Journal of Information Technology, Vol. 2, No. 4, October 2005, pp. 267&#45;274.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4844963&pid=S1665-6423200800020000100020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weis]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Security and Privacy in Radio-Frequency Identification Devices]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garfinkel]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Juels]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pappu.]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[RFID Privacy: An Overview of Problems and Proposed Solutions]]></article-title>
<source><![CDATA[IEEE Security & Privacy]]></source>
<year>May/</year>
<month>Ju</month>
<day>ne</day>
<page-range>34-43</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Landt]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The History of RFID]]></article-title>
<source><![CDATA[IEEE Potentials]]></source>
<year>Octo</year>
<month>be</month>
<day>r/</day>
<page-range>8-11</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Feldhofer]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Proposal for an Authentication Protocol in a Security Layer for RFID Smart Tags]]></source>
<year>Febr</year>
<month>ua</month>
<day>ry</day>
<publisher-loc><![CDATA[Austria ]]></publisher-loc>
<publisher-name><![CDATA[Institute for Applied Information Processing and CommunicationsGraz University of Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Juels]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[RFID Security and Privacy: A Research Survey]]></article-title>
<source><![CDATA[IEEE Journal on Selected Areas in Communications]]></source>
<year>Febr</year>
<month>ua</month>
<day>ry</day>
<volume>24</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>381-394</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peris-Lopez]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernandez-Castro]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Estevez-Tapiador]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ribagorda]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[RFID Systems: A Survey on Security Threats and Proposed Solutions]]></article-title>
<source><![CDATA[11th IFIP International Conference on Personal Wireless Communications - PWC06]]></source>
<year>2006</year>
<page-range>159-170</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rotter]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Framework for Assessing RFID System Security and Privacy Risks]]></article-title>
<source><![CDATA[IEEE Pervasive Computing]]></source>
<year>Apri</year>
<month>l-</month>
<day>Ju</day>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>70-77</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hassan]]></surname>
<given-names><![CDATA[H. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Challal]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Enhanced WEP: An Efficient Solution to WEP Threats]]></article-title>
<source><![CDATA[IEEE 2nd IFIP International Conference on Wireless and Optical Communications Networks]]></source>
<year>Marc</year>
<month>h </month>
<day>20</day>
<page-range>594-599</page-range><publisher-name><![CDATA[WOCN]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Purandare]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Enhancing Message Privacy in WEP]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Finkenzeller]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Waddington]]></surname>
<given-names><![CDATA[Rachel]]></given-names>
</name>
</person-group>
<source><![CDATA[RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification]]></source>
<year>2003</year>
<edition>2nd</edition>
<publisher-loc><![CDATA[West Sussex ]]></publisher-loc>
<publisher-name><![CDATA[John Wiley & Sons Ltd.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oppliger]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Authentication Systems for Secure Networks]]></source>
<year>1996</year>
<publisher-loc><![CDATA[Massachusetts ]]></publisher-loc>
<publisher-name><![CDATA[Artech House]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muftic]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Security Mechanisms for Computer Networks]]></source>
<year>1989</year>
<publisher-loc><![CDATA[West Sussex ]]></publisher-loc>
<publisher-name><![CDATA[Ellis Horwood Limited]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Purser]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Secure Data Networking]]></source>
<year>1996</year>
<publisher-loc><![CDATA[Massachusetts ]]></publisher-loc>
<publisher-name><![CDATA[Artech House]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fúster]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Técnicas Criptográficas de Protección de Datos]]></source>
<year>2001</year>
<edition>2nd</edition>
<publisher-name><![CDATA[Alfaomega]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stinson]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptography - Theory and Practice]]></source>
<year>2002</year>
<publisher-name><![CDATA[Chapman & HALLCRC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Myers]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[RFC 2222: Simple Authentication and Security Layer (SASL)]]></article-title>
<source><![CDATA[Status: Proposed Standard. Updated by RFC2444]]></source>
<year>Octo</year>
<month>be</month>
<day>r </day>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Knudsen]]></surname>
<given-names><![CDATA[L. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Meier.]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Preneel.]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Rijmen]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Verdoolaege]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analysis Methods for (Alleged) RC4, LNCS 1514]]></source>
<year></year>
<page-range>327-341</page-range><publisher-loc><![CDATA[Berlin ]]></publisher-loc>
<publisher-name><![CDATA[SpringerVerlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kitsos]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kostopoulos]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sklavos]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Koufopavlou]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Hardware Implementation of the RC4 Stream Cipher]]></article-title>
<source><![CDATA[Proceedings of the 46th IEEE International Midwest Symposium on Circuits and Systems]]></source>
<year>Dece</year>
<month>mb</month>
<day>er</day>
<volume>3</volume>
<page-range>1363-1366</page-range><publisher-name><![CDATA[MWSCAS 03]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hämäläinen]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Hännikäinen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hämäläinen]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Saarinen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hardware Implementation of the Improved WEP and RC4 Encryption Algorithm for Wireless Terminals]]></source>
<year>2000</year>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galanis]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kitsos]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kostopoulos]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sklavos]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Goutis]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Comparison of the Hardware Implementation of Stream Ciphers]]></article-title>
<source><![CDATA[The International Arab Journal of Information Technology]]></source>
<year>Octo</year>
<month>be</month>
<day>r </day>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>267-274</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
