A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Efficient Authentication and Key Agreement Protocol in RFID System
[chapter]
2008
Lecture Notes in Computer Science
In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. ...
They also proved the security of the protocol through the extended strand space model. This paper presents a more efficient authentication and key agreement protocol for RFID system than He et al.' ...
Therefore, in the RFID system, it is an important challenge to design an efficient and secure protocol which can be used in the low-cost tag [1, 2, 3, 4, 12] . In 2007, He et al. ...
doi:10.1007/978-3-540-88140-7_29
fatcat:gqtw2xrurfgsphmbecahndfe5y
Research on RFID authentication Protocol in Internet of Vehicles
2021
Scholars Journal of Engineering and Technology
This paper proposes an RFID authentication protocol in the Internet of Vehicles based on the certification center (CA). ...
The classic RFID authentication scheme cannot meet the special security and confidentiality requirements of RFID in Internet of Vehicles. ...
Kumar [7] proposed an elliptic curve-based RFID in-vehicle cloud computing (RSEAP) secure and efficient authentication protocol. ...
doi:10.36347/sjet.2021.v09i05.001
fatcat:mbjfb4xbyja2tk7t34gja744iy
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
[chapter]
2013
Communications in Computer and Information Science
Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. ...
The challenge is hidden from the eavesdropping through the technique of Diffie-Hellman key agreement protocol. ...
Besides we propose an efficient ECC-based authentication protocol for RFID system named Challenge-Hiding GPS scheme, and the scheme can provide backward privacy. ...
doi:10.1007/978-3-642-36252-1_43
fatcat:2ynymzxaenhjdaot2cuh4iicwy
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
[article]
2017
arXiv
pre-print
authentication with privacy, deniable authentication with privacy, authentication with mutual anonymity, authentication and key agreement with privacy, and three-factor authentication with privacy. ...
Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID ...
key agreement, RFID authentication, and handover authentication. ...
arXiv:1708.04027v1
fatcat:lozrjocwq5eblkams72kk4rv6i
Security and resilience for smart devices and applications
2014
EURASIP Journal on Wireless Communications and Networking
Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices. ...
There are many open questions for these challenging issues such as security of protocols and applications, secure architecture, frameworks and methodologies for next generation wireless networks and respective ...
However, special thanks go to Professor Luc Vandendorpe, Editor-in-Chief, for approving and making this issue possible and to the staff of EURASIP Journal on Wireless Communications and Networks for their ...
doi:10.1186/1687-1499-2014-123
fatcat:ljmyjdcaezf7ngavdybaz3ftbm
Research on RFID Security Authentication Protocol Based on HASH Function
2018
DEStech Transactions on Engineering and Technology Research
The protocol, while taking into account the tag overhead, increases the use of tags for information transmission and reader authentication, ensuring the security and efficiency of the authentication process ...
on the existing RFID authentication protocol, a RFID security scheme based on hash function is proposed. ...
Improved security and efficiency are the advantages of an improved protocol that increases the security of RFID systems to a certain extent. ...
doi:10.12783/dtetr/ecar2018/26353
fatcat:ibr6ev7h45aavpwfmigeibtrhy
Security Model of RFID Communication Provable Security Based on Password Authentication
2021
International Journal of Autonomous and Adaptive Communications Systems
A new access authentication protocol and a security association protocol supporting fast handover are proposed. ...
According to the RFID system level, the RFID equipment is layered and safely managed to construct a model that directly proves the authenticity of the logo without the need for third-party certification ...
Acknowledgements Research and development of robot for the aged, Item category: Youth Fund, Item number: QN2019328. ...
doi:10.1504/ijaacs.2021.10032587
fatcat:3bh2zddg3bfjlbhgmshlheodk4
Security of an RFID Protocol for Supply Chains
2008
2008 IEEE International Conference on e-Business Engineering
We discuss several shortcomings in this protocol related to mutual authentication, unlinkability, and desynchronization and suggest possible improvements. ...
We analyze the security requirements on RFID protocols to be used in supply chains. ...
Therefore, the security of tags, readers, and any other components of an RFID system is as important as the cost-effectiveness and time-efficiency. ...
doi:10.1109/icebe.2008.44
dblp:conf/icebe/DeursenR08
fatcat:6i62oij77red3ndh4ukykyvpai
Research of RFID Certification Security Protocol based on Hash Function and DES Algorithm
2013
Journal of Networks
The certification process analysis of several typical security protocols is based on existing RFID authentication protocol. It proposed an improved bidirectional authentication algorithm. ...
The protocol has anti-replay, impedance analysis, forgery, and tracking performance, and is suitable for the distributed system. ...
THE IMPROVED PROTOCOL DESIGN This paper presents an improved RFID authentication protocol based on Hash function and DES algorithm. This protocol is improved on the base of several agreements on. ...
doi:10.4304/jnw.8.10.2368-2375
fatcat:bja57vrz45a2xev5qckyx6vufi
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
[chapter]
2010
Lecture Notes in Computer Science
The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data ...
In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem while maintaining efficiency and identity privacy. ...
Conclusion and Future Work In this paper, we introduced new mutual authentication and key agreement protocols targeted at multi-domain RFID systems. ...
doi:10.1007/978-3-642-12368-9_9
fatcat:ew2kqfqugja5lomh43wnozpdzi
An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing
2022
Security and Communication Networks
Our security analysis clearly shows important security pitfalls in RSEAP2 such as mutual authentication, session key agreement, and denial-of-service attack. ...
IoT requires a safe and consistent RFID authentication system. ...
Acknowledgments is study did not receive any funding in any form. ...
doi:10.1155/2022/8998339
fatcat:3wjyergo7vc4ngbukmvbnejbpe
Tripartite Authentication Protocol RFID/NFC Based on ECC
2020
International Journal of Network Security
An RFID security three-party mutual authentication protocol based on elliptic curve cryptography (ECC) is designed in this paper. ...
with RFID and NFC system. ...
Related Work In studies of RFID authentication protocol based on ECC, most of them focus on the security and efficiency. ...
dblp:journals/ijnsec/WeiC20
fatcat:p4vdzs3anbhh7li3w6iwlyeeii
Design and Implementation of RFID Authentication Protocol based on Simple Symmetric Key (SSK) Algorithm
2020
International journal of recent technology and engineering
In this research article, we proposed new authentication protocol as a method to protect privacy, especially for affordable cost and functionalities and have limited power consumption, memory and effective ...
Though, the security, cost, time and task of RFID are accountable to identify the feasible authentication protocol according to the business environment. ...
Many research studies have explored the security problems in smart systems, such as access control, key agreement and data upload smart systems contain many network technology problems to be solved [8 ...
doi:10.35940/ijrte.f7131.038620
fatcat:pf6azqk5gbc3tptjxoiudra5ua
Lightweight Security Protocols for Internet of Things: A Review
2019
International Journal of Advanced Trends in Computer Science and Engineering
Smart devices and IoT applications have been widely used in many fields of social living, social production, home and industrial automation which have made people's life efficient and convenient. ...
But in recent years, ubiquitous deployment of some tools and technologies has raised several concerns related to the privacy and security in IoT enabled smart environment. ...
ECDH protocol is used for key agreement where peer entities generate a secret key and it is used for operations which involve a private key. ...
doi:10.30534/ijatcse/2019/58832019
fatcat:7wtxzomxcnfu7latkr3bl443e4
A Critical Analysis of RFID Security Protocols
2008
22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)
In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. ...
We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP and M2MAP. 1 confidentiality in communication between the tag and the reader. 2 reliability of the information ...
The requirements of reader protocol satisfied from confidentiality to replay attack prevention, proposed secure RFID reader authentication protocol, key agreement and message format. ...
doi:10.1109/waina.2008.212
dblp:conf/aina/SharifP08
fatcat:gcbauiw3ajaa5olkhqmnkp7w5u
« Previous
Showing results 1 — 15 out of 2,645 results