A review and analysis of secure and lightweight ECC‐based RFID authentication protocol for Internet of Vehicles
Radio‐frequency identification (RFID) technology has proliferated over the last few years
and being deployed as identification technology in numerous domains like intelligent …
and being deployed as identification technology in numerous domains like intelligent …
[HTML][HTML] ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags
Abstract Internet of Things (IoT) technologies rapidly evolve and are used in many real-life
applications. One of the core technologies used in various IoT applications is Radio …
applications. One of the core technologies used in various IoT applications is Radio …
URASP: An ultralightweight RFID authentication scheme using permutation operation
Due to low-cost, ease of use and convenience, Radio Frequency IDentification (RFID) is a
contactless technology that has become more and more promising for automatic …
contactless technology that has become more and more promising for automatic …
Novel lightweight RFID authentication protocols for inexpensive tags
AA Khorasgani, M Sajadieh, MR Yazdani - Journal of Information Security …, 2022 - Elsevier
Radio-frequency identification (RFID) systems represent a support technology employed for
the internet of things (IoT). Since RFID systems are now used extensively, it would be a …
the internet of things (IoT). Since RFID systems are now used extensively, it would be a …
A secure PUF-based unilateral authentication scheme for RFID system
Privacy and security concerns are significant barrier for RFID deployment in many
applications in modern day world. The implementation of authentication schemes which …
applications in modern day world. The implementation of authentication schemes which …
Quadratic residue-based unilateral authentication protocol for RFID system
Nowadays, Radio frequency identification (RFID) plays an important role in many real-life
applications for remotely identifying objects. RFID system works over a wireless …
applications for remotely identifying objects. RFID system works over a wireless …
MDS code based ultralightweight authentication protocol for RFID system
Privacy and security are central issues in the deployment of an RFID system. It is vulnerable
to several attacks, such as replay attacks, location tracking, man-in-middle attack, de …
to several attacks, such as replay attacks, location tracking, man-in-middle attack, de …
Linear complementary pair of codes based lightweight RFID protocol
Data security and privacy is an essential topic in today's life. It is necessary to prevent secret
data from leakage. There are many services where data transfer is done without any …
data from leakage. There are many services where data transfer is done without any …
An Ultra-Lightweight Secure RFID Authentication Protocol for Low-Cost Tags
Abstract Radio-Frequency Identification Technology (RFID) is a non-contact identification
technology based on radio waves. It is mainly comprised of an RFID reader and RFID tags …
technology based on radio waves. It is mainly comprised of an RFID reader and RFID tags …
Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol
Abstract Design of ultralightweight authentication protocols for RFID systems conformed with
the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security …
the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security …