A review and analysis of secure and lightweight ECC‐based RFID authentication protocol for Internet of Vehicles

S Kumar, H Banka, B Kaushik… - Transactions on …, 2021 - Wiley Online Library
Radio‐frequency identification (RFID) technology has proliferated over the last few years
and being deployed as identification technology in numerous domains like intelligent …

[HTML][HTML] ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags

M Shariq, K Singh, C Lal, M Conti, T Khan - Computer Networks, 2022 - Elsevier
Abstract Internet of Things (IoT) technologies rapidly evolve and are used in many real-life
applications. One of the core technologies used in various IoT applications is Radio …

URASP: An ultralightweight RFID authentication scheme using permutation operation

M Shariq, K Singh, PK Maurya, A Ahmadian… - Peer-to-Peer Networking …, 2021 - Springer
Due to low-cost, ease of use and convenience, Radio Frequency IDentification (RFID) is a
contactless technology that has become more and more promising for automatic …

Novel lightweight RFID authentication protocols for inexpensive tags

AA Khorasgani, M Sajadieh, MR Yazdani - Journal of Information Security …, 2022 - Elsevier
Radio-frequency identification (RFID) systems represent a support technology employed for
the internet of things (IoT). Since RFID systems are now used extensively, it would be a …

A secure PUF-based unilateral authentication scheme for RFID system

PK Maurya, S Bagchi - Wireless Personal Communications, 2018 - Springer
Privacy and security concerns are significant barrier for RFID deployment in many
applications in modern day world. The implementation of authentication schemes which …

Quadratic residue-based unilateral authentication protocol for RFID system

PK Maurya, S Bagchi - Multimedia Tools and Applications, 2023 - Springer
Nowadays, Radio frequency identification (RFID) plays an important role in many real-life
applications for remotely identifying objects. RFID system works over a wireless …

MDS code based ultralightweight authentication protocol for RFID system

PK Maurya, H Ghosh, S Bagchi - IEEE Access, 2023 - ieeexplore.ieee.org
Privacy and security are central issues in the deployment of an RFID system. It is vulnerable
to several attacks, such as replay attacks, location tracking, man-in-middle attack, de …

Linear complementary pair of codes based lightweight RFID protocol

H Ghosh, PK Maurya, S Bagchi - Computer Communications, 2023 - Elsevier
Data security and privacy is an essential topic in today's life. It is necessary to prevent secret
data from leakage. There are many services where data transfer is done without any …

An Ultra-Lightweight Secure RFID Authentication Protocol for Low-Cost Tags

S Kumar, H Banka, B Kaushik, S Sharma - Journal of Computer Virology …, 2024 - Springer
Abstract Radio-Frequency Identification Technology (RFID) is a non-contact identification
technology based on radio waves. It is mainly comprised of an RFID reader and RFID tags …

Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol

SF Aghili, H Mala - Peer-to-Peer Networking and Applications, 2020 - Springer
Abstract Design of ultralightweight authentication protocols for RFID systems conformed with
the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security …