Scalable RFID security framework and protocol supporting Internet of Things
Radio-frequency identification (RFID) is seen as one of the requirements for the
implementation of the Internet-of-Things (IoT). However, an RFID system has to be equipped …
implementation of the Internet-of-Things (IoT). However, an RFID system has to be equipped …
RFID security in the context of" internet of things"
R Aggarwal, ML Das - Proceedings of the First International Conference …, 2012 - dl.acm.org
Internet has emerged as a medium to connect entities across the world for emailing,
conferencing, trading, gaming and so on. Internet of Things (IoT) is emerging as a global …
conferencing, trading, gaming and so on. Internet of Things (IoT) is emerging as a global …
Strong Security and Privacy of RFID System for Internet of Things Infrastructure
ML Das - … , Privacy, and Applied Cryptography Engineering: Third …, 2013 - Springer
Abstract RFID (Radio Frequency IDentification) system has found enormous applications in
retail, health care, transport, and home appliances. Over the years, many protocols have …
retail, health care, transport, and home appliances. Over the years, many protocols have …
A communication protocol of RFID systems in internet of things
HD Gao, YJ Guo, JQ Cui, HG Hao, H Shi - International Journal of …, 2012 - earticle.net
Radio frequency identification (RFID) is one of the key technologies which constitute internet
of things. Security and privacy issues of RFID systems is the focus of the present study. By …
of things. Security and privacy issues of RFID systems is the focus of the present study. By …
A highly scalable RFID authentication protocol
J Wu, DR Stinson - Australasian conference on information security and …, 2009 - Springer
In previous RFID protocols, a hash-chain is used to achieve good privacy. Each tag is
associated with a chain of Q hash values. To identify one tag out of a total of N tags, a server …
associated with a chain of Q hash values. To identify one tag out of a total of N tags, a server …
A potential weakness in RFID-based Internet-of-things systems
I Erguler - Pervasive and Mobile Computing, 2015 - Elsevier
In recent years, a large body of research has been devoted to the security and privacy of
RFID that is expected to become a critical component of IoT (Internet of Things). Most of …
RFID that is expected to become a critical component of IoT (Internet of Things). Most of …
Security enhanced RFID authentication protocols for healthcare environment
S Xie, F Zhang, R Cheng - Wireless Personal Communications, 2021 - Springer
RFID technology, which is concerned as one of the core technologies of Internet of Things,
has been widely deployed in healthcare environment and brings a lot of convenience for …
has been widely deployed in healthcare environment and brings a lot of convenience for …
An enhanced authentication protocol for RFID systems
In this paper, we analyse the security of two mutual authentication protocols that have been
recently proposed by Gao et al.(IEEE Access, 7: 8376-8384, 2019), a hash-based protocol …
recently proposed by Gao et al.(IEEE Access, 7: 8376-8384, 2019), a hash-based protocol …
An efficient and secure authentication protocol for RFID systems
MM Morshed, A Atkins, H Yu - The 17th International …, 2011 - ieeexplore.ieee.org
The use of RFID tags may cause privacy violation of users carrying an RFID tag. Due to the
unique identification number of the RFID tag, the possible privacy threats are information …
unique identification number of the RFID tag, the possible privacy threats are information …
RAFI: Robust authentication framework for IoT-based RFID infrastructure
The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of
physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have …
physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have …