SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system

H Luo, G Wen, J Su, Z Huang - Wireless Networks, 2018 - Springer
Data security is crucial for a RFID system. Since the existing RFID mutual authentication
protocols encounter the challenges such as security risks, poor performance, an ultra …

RCIA: A new ultralightweight RFID authentication protocol using recursive hash

U Mujahid, M Najam-ul-Islam… - International Journal of …, 2015 - journals.sagepub.com
RFID is one of the most protuberant systems in the field of ubiquitous computing. Since RFID
tags have limited computation capabilities, numerous ultralightweight authentication …

Ultralightweight RFID Authentication Protocols for Low‐Cost Passive RFID Tags

M Khalid, U Mujahid… - Security and …, 2019 - Wiley Online Library
The field of pervasive computing especially the Internet of Things (IoT) network is evolving
due to high network speed and increased capacity offered by the 5G communication system …

A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP

U Mujahid, M Najam-ul-Islam, S Sarwar - Wireless Personal …, 2017 - Springer
Abstract Radio Frequency IDentification (RFID) is one of the most promising identification
schemes in the field of pervasive systems. Unique identification and non-line of sight …

Efficient authentication for mobile and pervasive computing

B Alomair, R Poovendran - IEEE Transactions on Mobile …, 2012 - ieeexplore.ieee.org
With today's technology, many applications rely on the existence of small devices that can
exchange information and form communication networks. In a significant portion of such …

Pitfalls in ultralightweight authentication protocol designs

G Avoine, X Carpent… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This article introduces prudent engineering practices and offers recommendations to follow,
together with typical mistakes to avoid, when designing new ultralightweight authentication …

Privacy-friendly synchronized ultralightweight authentication protocols in the storm

G Avoine, X Carpent, B Martin - Journal of Network and Computer …, 2012 - Elsevier
In the recent years, there has been an increasing interest in the development of secure and
private authentication protocols for RFID. In order to suit the very lightweight nature of RFID …

Yet another ultralightweight authentication protocol that is broken

G Avoine, X Carpent - Radio Frequency Identification. Security and Privacy …, 2013 - Springer
Eghdamian and Samsudin published at ICIEIS 2011 an ultralightweight mutual
authentication protocol that requires few bitwise operations. The simplicity of the design …

[图书][B] Security of ubiquitous computing systems: Selected topics

G Avoine, J Hernandez-Castro - 2021 - library.oapen.org
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the
objective of which was to improve and adapt existent cryptanalysis methodologies and tools …

Security analysis and improvement on two RFID authentication protocols

S Wang, S Liu, D Chen - Wireless Personal Communications, 2015 - Springer
Several lightweight RFID authentication protocols have been proposed to settle the security
and privacy problems. Nevertheless, most of these protocols are analyzed and they are not …