Academic literature on the topic 'RFID mutual authentication protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RFID mutual authentication protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "RFID mutual authentication protocol"
He, Hong, Qi Li, and Zhi Hong Zhang. "RFID Security Authentication Protocol Based on Hash for the Lightweight RFID Systems." Applied Mechanics and Materials 380-384 (August 2013): 2831–36. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2831.
Full textXia, Hui. "Research on Multiple Security Authentication Protocol in RFID System." Applied Mechanics and Materials 457-458 (October 2013): 770–73. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.770.
Full textChia-Hui Wei, Min-Shiang Hwang, and A. Y. Chin. "A Mutual Authentication Protocol for RFID." IT Professional 13, no. 2 (March 2011): 20–24. http://dx.doi.org/10.1109/mitp.2011.17.
Full textMujahid, Umar, Atif Raza Jafri, and M. Najam-ul-Islam. "Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol." Journal of Circuits, Systems and Computers 25, no. 07 (April 22, 2016): 1650078. http://dx.doi.org/10.1142/s021812661650078x.
Full textV. Sampangi, Raghav, and Srinivas Sampalli. "RFID Mutual Authentication Protocols based on Gene Mutation and Transfer." Journal of Communications Software and Systems 9, no. 1 (March 23, 2013): 44. http://dx.doi.org/10.24138/jcomss.v9i1.157.
Full textBaashirah, Rania, and Abdelshakour Abuzneid. "SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography." Electronics 8, no. 10 (October 15, 2019): 1166. http://dx.doi.org/10.3390/electronics8101166.
Full textChen, Chien-Ming, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, and Hung-Min Sun. "A Secure RFID Authentication Protocol Adopting Error Correction Code." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/704623.
Full textQin, Hang, and Yi Liu. "A Secure Lightweight Mutual Authentication for RFID Systems." Applied Mechanics and Materials 644-650 (September 2014): 4496–500. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.4496.
Full textPiramuthu, Selwyn. "RFID mutual authentication protocols." Decision Support Systems 50, no. 2 (January 2011): 387–93. http://dx.doi.org/10.1016/j.dss.2010.09.005.
Full textAhn, Hae-Soon, Ki-Dong Bu, Eun-Jun Yoon, and In-Gil Nam. "RFID Mutual Authentication Protocol Providing Stronger Security." KIPS Transactions:PartC 16C, no. 3 (June 30, 2009): 325–34. http://dx.doi.org/10.3745/kipstc.2009.16-c.3.325.
Full textDissertations / Theses on the topic "RFID mutual authentication protocol"
Kulseng, Lars Skaar. "Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems." [Ames, Iowa : Iowa State University], 2009.
Find full textChung, Harold. "Chaos Based RFID Authentication Protocol." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/24250.
Full textJafri, Asad Abbas. "Enhanced secured authentication protocol for RFID systems." Thesis, Wichita State University, 2008. http://hdl.handle.net/10057/2029.
Full textThesis [M.S] - Wichita State University, College of Engineering, Dept. of Electrical and Computer Science Engineering
Jafri, Asad Abbas Pendse Ravindra. "Enhanced secured authentication protocol for RFID systems." A link to full text of this thesis in SOAR, 2008. http://hdl.handle.net/10057/2029.
Full textEdelev, Sviatoslav [Verfasser], Dieter [Akademischer Betreuer] Hogrefe, and Xiaoming [Akademischer Betreuer] Fu. "Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol / Sviatoslav Edelev. Gutachter: Dieter Hogrefe ; Xiaoming Fu. Betreuer: Dieter Hogrefe." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2015. http://d-nb.info/1076673597/34.
Full textMalecký, Marek. "Analýza vybraných bezpečnostních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237107.
Full textSANTHANAM, LAKSHMI. "Integrated Security Architecture for Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1202846575.
Full textYuan, Ching-chien, and 袁境鍵. "Hardware Implementation of RFID Mutual Authentication Protocol." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/46028509272753713099.
Full text義守大學
電子工程學系碩士班
97
Radio Frequency Identification (RFID) is a wireless technology which utilizes radio communication to identify objects with a unique electrical identity. The widespread deployment of RFID technologies may generate new threats to security and user privacy. One of the main drawbacks for RFID technology is the weak authentication systems between reader and tag. In general, weak authentication systems that either leak the password directly over the network or that leak sufficient information while performing authentication to allow intruders to deduce or guess at the password. According to EPCglobal Class1 Gen2 authentication system, the important information in tag will be exposed inadvertently because of the wireless transmission of data while performing authentication and causes much of threat to security. In this dissertation, we study the RFID tag-reader mutual authentication scheme. To avoid direct exposure of vital information from wireless transmission, the primitive exposed information must be covered in authentication process. A hardware implementation of mutual authentication protocol for RFID system is also proposed. The proposed system was simulated using Altera Quartus II software. The system has been successfully implemented in hardware using Altera DE2 board includes an Altera Cyclone II Field Programmable Gate Array (FPGA). The output waveforms from the FPGA have been displayed on the 16702A Logic Analysis System for real time verification. Finally the gate level files have been performed within mutual authentication schemes using Synopsys Design Vision from CIC and analyzed the power dissipation with different authentication schemes by Prime Power.
Li, Perry, and 李培宇. "RFID mutual Authentication Protocol based on Hamming Distance." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/56512911502492089377.
Full text國立交通大學
網路工程研究所
99
RFID is a technology that uses the RF technology to transfer ID. The RFID applications include electronic wallet, access control card, … , etc. Because the passive RFID Tag has resourse constraint issues, the RFID systems usually have some security problems, such as tracing attack, denial of service, forward security, replay attack, impersonation attack and relay attack, etc. To address the security issues, lots of solutions had been proposed. The RFID standard supports CRC function, and the function can extend or shrink a variable length string to a fixed length string. So, we can use it to compare the different of variable length strings. And we can then use the result to detect the security attack in the RFID system. The circuit of hamming distance isn’t complex, and it has high performance. In this thesis, we proposed an authentication protocol, MAPHD, which uses the hamming distance to compare the key strings. With carefull discussion and comparison, we conclude that our protocol can provide good protection for the security of RFID applications with lightweight overhead of tag computation.
Liao, Wei-Chih, and 廖偉志. "Secure and Efficient Mutual Authentication Protocol for RFID systems." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/13935129028580827426.
Full text國立交通大學
資訊科學與工程研究所
99
Radio Frequency Identification (RFID) is a non-contact sensor network technology to automate identification. RFID systems had been applied to many fields and have been considered as a key infrastructure for the ubiquitous society in the future. However, because RFID tag on the inherent limitations of hardware resources, RFID has various security threats like privacy problem, eavesdropping, tag cloning, tag tracing, etc. To address these problems, lots of solutions had been proposed. RFID authentication protocol is one kind of these solutions. The point of RFID authentication protocol is to enforce the security policy between legal RFID tags can the legal RFID readers. RFID authentication protocols provide a mutual authentication mechanism to protect RFID system. But most of them have some drawbacks. These problems include the security not strong enough to resist various RFID attacks, the computation overhead of RFID tag is too high, and the back-end server spends too much time for searching RFID tag data, and etc. In this thesis, we proposed two RFID authentication protocols to overcome these drawbacks. In our analysis, the results have demonstrated that our RFID authentication protocols can resist most common RFID attacks and are more effective than most RFID authentication protocols.
Book chapters on the topic "RFID mutual authentication protocol"
Kang, You Sung, Elizabeth O’Sullivan, Dooho Choi, and Maire O’Neill. "Security Analysis on RFID Mutual Authentication Protocol." In Information Security Applications, 65–74. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31875-2_6.
Full textZhang, Changlun, and Haibing Mu. "A Lightweight Mutual Authentication Protocol for RFID." In Lecture Notes in Electrical Engineering, 933–40. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-7262-5_106.
Full textFernando, Harinda, and Jemal Abawajy. "A Hybrid Mutual Authentication Protocol for RFID." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 310–11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29154-8_29.
Full textKim, Hyunsung. "Enhanced Hash-Based RFID Mutual Authentication Protocol." In Communications in Computer and Information Science, 70–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35264-5_10.
Full textJin, Yongming, Huiping Sun, Wei Xin, Song Luo, and Zhong Chen. "Lightweight RFID Mutual Authentication Protocol against Feasible Problems." In Information and Communications Security, 69–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25243-3_6.
Full textHristea, Cristian, and Ferucio Laurenţiu Ţiplea. "A PUF-Based Destructive Private Mutual Authentication RFID Protocol." In Innovative Security Solutions for Information Technology and Communications, 331–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12942-2_25.
Full textFu, Xiaotong, and Yandong Guo. "A Lightweight RFID Mutual Authentication Protocol with Ownership Transfer." In Communications in Computer and Information Science, 68–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36252-1_7.
Full textLiang, Wei, Songyou Xie, Xiong Li, Jing Long, Yong Xie, and Kuan-Ching Li. "A Novel Lightweight PUF-Based RFID Mutual Authentication Protocol." In Lecture Notes in Electrical Engineering, 345–55. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7398-4_36.
Full textLu, Yong, Anxi Wang, and Shuai Liu. "A Mutual Authentication Lightweight RFID Protocol for IoT Devices." In Communications in Computer and Information Science, 518–25. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6113-9_58.
Full textSaxena, Mansi, Rabindra Nath Shaw, and Jitendra Kumar Verma. "A Novel Hash-Based Mutual RFID Tag Authentication Protocol." In Data and Communication Networks, 1–12. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2254-9_1.
Full textConference papers on the topic "RFID mutual authentication protocol"
Huey, Khor Jing, Widad Ismail, and Mohammad Ghulam Rahman. "Fingerprint-based mutual authentication RFID protocol." In 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC). IEEE, 2011. http://dx.doi.org/10.1109/icspcc.2011.6061560.
Full textHuang, Yu-Jung, Chi-Huan Jiang, Hsuan-Hsun Wu, Yi-Hao Hong, and Kai-Jen Liu. "Mutual Authentication Protocol for RFID System." In 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE). IEEE, 2011. http://dx.doi.org/10.1109/cse.2011.27.
Full textRenault, Eric, and Selma Boumerdassit. "Simple mutual authentication protocol for RFID." In TENCON 2007 - 2007 IEEE Region 10 Conference. IEEE, 2007. http://dx.doi.org/10.1109/tencon.2007.4429088.
Full textLin, Chia-Min, Shyh-Chang Tsaur, Yeong-Chin Chen, and Iuon-Chang Lin. "HB Family RFID Mutual Authentication Protocol." In 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2011. http://dx.doi.org/10.1109/iihmsp.2011.86.
Full textRahnama, Abbas, Mohammad Beheshti-Atashgah, Taraneh Eghlidos, and Mohammad Reza Aref. "An Ultra-Lightweight RFID Mutual Authentication Protocol." In 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). IEEE, 2019. http://dx.doi.org/10.1109/iscisc48546.2019.8985164.
Full textFernando, Harinda, and Jemal Abawajy. "Mutual Authentication Protocol for Networked RFID Systems." In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.54.
Full textFan, Kai, Qi Luo, Hui Li, and Yintang Yang. "Cloud-Based Lightweight RFID Mutual Authentication Protocol." In 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC). IEEE, 2017. http://dx.doi.org/10.1109/dsc.2017.41.
Full textKavitha, S. M., T. Suresh, and M. Joy Metilda Rani. "RFID implementation with secure mutual authentication protocol." In 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE, 2012. http://dx.doi.org/10.1109/icceet.2012.6203738.
Full textLuo, Liyun, and Daowei Liu. "An Improved Lightweight RFID Mutual-authentication Protocol." In Second International Conference on Mechanics, Materials and Structural Engineering (ICMMSE 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/icmmse-17.2017.45.
Full textHuo, Weiguang, Qingkuan Dong, and Yuan Chen. "ECC-based RFID/NFC Mutual Authentication Protocol." In 2015 2nd International Workshop on Materials Engineering and Computer Sciences. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/iwmecs-15.2015.31.
Full textReports on the topic "RFID mutual authentication protocol"
Oiwa, Y., H. Watanabe, H. Takagi, K. Maeda, T. Hayashi, and Y. Ioku. Mutual Authentication Protocol for HTTP. RFC Editor, April 2017. http://dx.doi.org/10.17487/rfc8120.
Full textHartman, S., M. Wasserman, and D. Zhang. Extensible Authentication Protocol (EAP) Mutual Cryptographic Binding. RFC Editor, October 2013. http://dx.doi.org/10.17487/rfc7029.
Full textBadra, M., A. Luchuk, and J. Schoenwaelder. Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication. RFC Editor, June 2015. http://dx.doi.org/10.17487/rfc7589.
Full textOiwa, Y., H. Watanabe, H. Takagi, K. Maeda, T. Hayashi, and Y. Ioku. Mutual Authentication Protocol for HTTP: Cryptographic Algorithms Based on the Key Agreement Mechanism 3 (KAM3). RFC Editor, April 2017. http://dx.doi.org/10.17487/rfc8121.
Full text