SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system

H Luo, G Wen, J Su, Z Huang - Wireless Networks, 2018 - Springer
Data security is crucial for a RFID system. Since the existing RFID mutual authentication
protocols encounter the challenges such as security risks, poor performance, an ultra …

Desynchronization attack on RAPP ultralightweight authentication protocol

Z Ahmadian, M Salmasizadeh, MR Aref - Information processing letters, 2013 - Elsevier
RAPP (RFID Authentication Protocol with Permutation) is a recently proposed and efficient
ultralightweight authentication protocol. Although it maintains the structure of the other …

RCIA: A new ultralightweight RFID authentication protocol using recursive hash

U Mujahid, M Najam-ul-Islam… - International Journal of …, 2015 - journals.sagepub.com
RFID is one of the most protuberant systems in the field of ubiquitous computing. Since RFID
tags have limited computation capabilities, numerous ultralightweight authentication …

Ultralightweight RFID Authentication Protocols for Low‐Cost Passive RFID Tags

M Khalid, U Mujahid… - Security and …, 2019 - Wiley Online Library
The field of pervasive computing especially the Internet of Things (IoT) network is evolving
due to high network speed and increased capacity offered by the 5G communication system …

Passive secret disclosure attack on an ultralightweight authentication protocol for internet of things

M Safkhani, N Bagheri - The Journal of Supercomputing, 2017 - Springer
Abstract Internet of Things (IoT) is a technology in which for any object the ability to send
data via communications networks is provided. Ensuring the security of Internet services and …

A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP

U Mujahid, M Najam-ul-Islam, S Sarwar - Wireless Personal …, 2017 - Springer
Abstract Radio Frequency IDentification (RFID) is one of the most promising identification
schemes in the field of pervasive systems. Unique identification and non-line of sight …

Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI protocols

M Safkhani, N Bagheri - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Tian et al. proposed a permutation based authentication protocol entitled RAPP. However, it
came out very soon that it suffers from several security treats such as desynchronization …

A novel lightweight block cipher-based mutual authentication protocol for constrained environments

C Trinh, B Huynh, J Lansky, S Mildeova… - IEEE …, 2020 - ieeexplore.ieee.org
The communication security of constrained objects such as radio frequency identification
(RFID) tags and wireless sensor network (WSN) is very challenging because it is not always …

Toward designing a secure authentication protocol for IoT environments

M Hosseinzadeh, MH Malik, M Safkhani, N Bagheri… - Sustainability, 2023 - mdpi.com
Authentication protocol is a critical part of any application to manage the access control in
many applications. A former research recently proposed a lightweight authentication …

A New Ultralightweight RFID Protocol for Low-Cost Tags: RAP

X Zhuang, Y Zhu, CC Chang - Wireless Personal Communications, 2014 - Springer
Several ultralightweight radio frequency identification (RFID) authentication protocols have
been proposed in recent years. However, all of these protocols are reported later that they …