To see the other types of publications on this topic, follow the link: RFID mutual authentication protocol.

Journal articles on the topic 'RFID mutual authentication protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'RFID mutual authentication protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

He, Hong, Qi Li, and Zhi Hong Zhang. "RFID Security Authentication Protocol Based on Hash for the Lightweight RFID Systems." Applied Mechanics and Materials 380-384 (August 2013): 2831–36. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2831.

Full text
Abstract:
In order to solve the RFID authentication protocols, a new mutual authentication protocol based on Hash for the lightweight RFID system is proposed in this paper. Compared with several RFID authentication protocols with the similar structure, the proposed protocol can effectively solve the privacy and security of the RFID system, and it has significant performance advantages. It greatly reduces the amount storage and computation of tags.
APA, Harvard, Vancouver, ISO, and other styles
2

Xia, Hui. "Research on Multiple Security Authentication Protocol in RFID System." Applied Mechanics and Materials 457-458 (October 2013): 770–73. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.770.

Full text
Abstract:
Weak security of RFID system is concerned by more and more people because of the fast development of internet of things. Some existing RFID authentications protocols begin to be analyzed, such as Mutual three-pass authentication, randomized Hash-Lock, which has some problem of being difficult to resist a variety of network attacks such as forgery tag attacks and a new bidirectional security authentication protocol,A multiple security authentication protocol is proposed to overcome the disadvantage of being vulnerable to cyber attacks. Analysis shows that this approach is of good security and privacy, low cost, and high efficiency.
APA, Harvard, Vancouver, ISO, and other styles
3

Chia-Hui Wei, Min-Shiang Hwang, and A. Y. Chin. "A Mutual Authentication Protocol for RFID." IT Professional 13, no. 2 (March 2011): 20–24. http://dx.doi.org/10.1109/mitp.2011.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mujahid, Umar, Atif Raza Jafri, and M. Najam-ul-Islam. "Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol." Journal of Circuits, Systems and Computers 25, no. 07 (April 22, 2016): 1650078. http://dx.doi.org/10.1142/s021812661650078x.

Full text
Abstract:
Security and privacy are the two major concerns of radio-frequency identification (RFID) based identification systems. Several researchers have proposed ultralightweight mutual authentication protocols (UMAPs) to ensure the security of the low cost RFID tags in recent years. However, almost all of the previously proposed protocols have some serious security flaws and are vulnerable to various security attacks (full disclosure attack, desynchronization attack, impersonation attack, etc.). Recently, a more sophisticated and robust UMAP: Robust confidentiality integrity and authentication (RCIA)1 [U. Mujahid, M. Najam-ul-Islam and M. Ali Shami, RCIA: A new ultralightweight RFID authentication protocol using recursive hash, Int. J. Distrib. Sens. Netw. 2015 (2015) 642180] has been proposed. A new ultralightweight primitive, “recursive hash” has been used extensively in the protocol design which provides hamming weight unpredictability and irreversibility to ensure optimal security. In addition to security and privacy, small chip area is another design constraint which is mandatory requirement for a protocol to be considered as ultralightweight authentication protocol. Keeping in view the scenario presented above, this paper presents the efficient hardware implementation of the RCIA for EPC-C1G2 tags. Both the FPGA and ASIC implementation flows have been adopted. The FPGA design flow is primarily used to validate the functionality of the proposed hardware design whereas ASIC design (using TSMC 0.35 μm library) is used to validate the gate count. To the best of our knowledge, this is the first FPGA and ASIC implementation of any ultralightweight RFID authentication protocol. The simulation and synthesis results of the proposed optimal hardware architecture show the compatibility of the RCIA with extremely low cost RFID tags.
APA, Harvard, Vancouver, ISO, and other styles
5

V. Sampangi, Raghav, and Srinivas Sampalli. "RFID Mutual Authentication Protocols based on Gene Mutation and Transfer." Journal of Communications Software and Systems 9, no. 1 (March 23, 2013): 44. http://dx.doi.org/10.24138/jcomss.v9i1.157.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis.
APA, Harvard, Vancouver, ISO, and other styles
6

Baashirah, Rania, and Abdelshakour Abuzneid. "SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography." Electronics 8, no. 10 (October 15, 2019): 1166. http://dx.doi.org/10.3390/electronics8101166.

Full text
Abstract:
Internet of Things (IoT) is a new paradigm that has been evolving into the wireless sensor networks to expand the scope of networked devices (or things). This evolution drives communication engineers to design secure and reliable communication at a low cost for many network applications such as radio frequency identification (RFID). In the RFID system, servers, readers, and tags communicate wirelessly. Therefore, mutual authentication is necessary to ensure secure communication. Normally, a central server supports the authentication of readers and tags by distributing and managing the credentials. Recent lightweight RFID authentication protocols have been proposed to satisfy the security features of RFID networks. Using a serverless RFID system is an alternative solution to using a central server. In this model, both the reader and the tag perform mutual authentication without the need for the central server. However, many security challenges arise from implementing lightweight authentication protocols in serverless RFID systems. We propose a new secure serverless RFID authentication protocol based on the famous elliptic curve cryptography (ECC). The protocol also maintains the confidentiality and privacy of the messages, tag information, and location. Although most of the current serverless protocols assume secure channels in the setup phase, we assume an insecure environment during the setup phase between the servers, readers, and tags. We ensure that the credentials can be renewed by any checkpoint server in the mobile RFID network. Thus, we implement ECC in the setup phase (renewal phase), to transmit and store the communication credentials of the server to multiple readers so that the tags can perform the mutual authentication successfully while far from the server. The proposed protocol is compared with other serverless frameworks proposed in the literature in terms of computation cost and attacks resistance.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Chien-Ming, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, and Hung-Min Sun. "A Secure RFID Authentication Protocol Adopting Error Correction Code." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/704623.

Full text
Abstract:
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.
APA, Harvard, Vancouver, ISO, and other styles
8

Qin, Hang, and Yi Liu. "A Secure Lightweight Mutual Authentication for RFID Systems." Applied Mechanics and Materials 644-650 (September 2014): 4496–500. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.4496.

Full text
Abstract:
Radio Frequency Identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects. It is well suitable for many fields and is expected to replace barcodes in the near future. However, it is a challenging task to design an authentication protocol because of the limited resource of low-cost RFID tags. Recently, a lightweight RFID authentication protocol presented by Kulseng et al uses Physically Unclonable Functions (PUFs) and Linear Feedback Shift Registers (LFSRs) which are well known lightweight operations. The number of gates which the protocol require can be significantly decreased. Unfortunately, their protocol faces several serious security issues. In this paper, based PUFs and LFSRs, we suggest a secure mutual authentication for low-cost RFID Systems. Security analysis shows that our protocol owns security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
9

Piramuthu, Selwyn. "RFID mutual authentication protocols." Decision Support Systems 50, no. 2 (January 2011): 387–93. http://dx.doi.org/10.1016/j.dss.2010.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ahn, Hae-Soon, Ki-Dong Bu, Eun-Jun Yoon, and In-Gil Nam. "RFID Mutual Authentication Protocol Providing Stronger Security." KIPS Transactions:PartC 16C, no. 3 (June 30, 2009): 325–34. http://dx.doi.org/10.3745/kipstc.2009.16-c.3.325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

WANG, Li-bin, Chang-she MA, and Tao WANG. "Secure and efficient RFID mutual authentication protocol." Journal of Computer Applications 28, no. 9 (June 5, 2009): 2236–38. http://dx.doi.org/10.3724/sp.j.1087.2008.02236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Huang, Yu-Jung, Wei-Cheng Lin, and Hung-Lin Li. "Efficient Implementation of RFID Mutual Authentication Protocol." IEEE Transactions on Industrial Electronics 59, no. 12 (December 2012): 4784–91. http://dx.doi.org/10.1109/tie.2011.2178215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Yu-Jung Huang, Ching-Chien Yuan, Ming-Kun Chen, Wei-Cheng Lin, and Hsien-Chiao Teng. "Hardware Implementation of RFID Mutual Authentication Protocol." IEEE Transactions on Industrial Electronics 57, no. 5 (May 2010): 1573–82. http://dx.doi.org/10.1109/tie.2009.2037098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jia, Qing Xuan, Xin Wang, Xin Gao, Pan Pan Gao, and Bing Zhao. "An Effective Ultralightweight RFID Secure Protocol with Mutual Authentication." Applied Mechanics and Materials 278-280 (January 2013): 1966–71. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1966.

Full text
Abstract:
Due to the radio transmission nature of RFID, the challenge of security and privacy has seriously hindered the large-scale development of RFID technology. However, low-cost RFID tags have the characteristic of extremely limited resources, traditional security primitives cannot be better applied in RFID system. Hence, Designing an effective ultralightweight security protocol applying to low-cost tag is crucial for the various applications of RFID system. In this paper, we propose an ultralightweight secure protocol with mutual authentication. Without adopting classical cryptographic primitives, the protocol proposed only employs simple bit-wise operations such as xor and module addition. Meanwhile, the protocol can resist various attacks and has features of low computation cost and communication traffic.
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Nan, Jian Hua Zhang, and Jun Yang. "RFID Mutual Authentication Protocol Based on Chaos Key." Advanced Materials Research 846-847 (November 2013): 1519–23. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1519.

Full text
Abstract:
While radio frequency identification (RFID) is evolving as a major technology enabler for identifying and tracking goods and assets around the world, its security issues are also increasingly exposed. A Hash-based RFID mutual authentication protocol was put forward. The key was joined into the hash algorithm, and chaos sequences were used to update the key. The protocol enhances the security of the RFID system with low cost. Experiments show that the chaos system has the character of initial value sensitivity, which can be used to distribute and update the secret key. Safety analysis show that the mutual authentication protocol can solve security issues including eavesdropping, illegal access, masquerade, spoofing attack, position tracking.
APA, Harvard, Vancouver, ISO, and other styles
16

Zhang, Bing, Zhi Guang Qin, Guo Gen Wan, and Xin Xin Ma. "Design and Analysis of a Low-Cost Mutual Authentication Protocol for RFID." Applied Mechanics and Materials 543-547 (March 2014): 2255–61. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2255.

Full text
Abstract:
This document analyzes the security drawback of the Hash-based algorithm authentication protocols which is frequently used in low-cost RFID systems, and proposes a lightweight mutual authentication protocol. In the proposed protocol, all authenticated information is encrypted , the location privacy is also provided by refreshing an identifier of a tag in each session and lost massages can be recovered from many attacks such as spoofing attacks. The comparison result of the simulation experiment and the formal correctness proof of the proposed authentication protocol is based on BAN logic. It shows that the proposed protocol in this article greatly enhance the capability of verifiability, confidentiality and integrality, it also corrects the existing Hash-based protocol secure deficiency so that it is more suitable for low-cost RFID systems than those existing ones.
APA, Harvard, Vancouver, ISO, and other styles
17

Ibrahim, Alaauldin, and Gökhan Dalkılıç. "An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP." Journal of Sensors 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/2367312.

Full text
Abstract:
Information in patients’ medical histories is subject to various security and privacy concerns. Meanwhile, any modification or error in a patient’s medical data may cause serious or even fatal harm. To protect and transfer this valuable and sensitive information in a secure manner, radio-frequency identification (RFID) technology has been widely adopted in healthcare systems and is being deployed in many hospitals. In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve cryptography and advanced encryption standard. Unlike existing authentication protocols, which only send the tag ID securely, the proposed protocol could also send the valuable data stored in the tag in an encrypted pattern. The proposed protocol is not simply a theoretical construct; it has been coded and tested on an experimental RFID tag. The proposed scheme achieves mutual authentication in just two steps and satisfies all the essential security requirements of RFID-based healthcare systems.
APA, Harvard, Vancouver, ISO, and other styles
18

Kumar, Adarsh, Krishna Gopal, and Alok Aggarwal. "Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things." Journal of Communications Software and Systems 10, no. 3 (March 16, 2017): 179. http://dx.doi.org/10.24138/jcomss.v10i3.122.

Full text
Abstract:
Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio frequency based addressing scheme in IoT. Major security challenge in resource constraint RFID networks is how to achieve traditional CIA security i.e. Confidentiality, Integrity and Authentication. Computational and communication costs for Lightweight Mutual Authentication Protocol (LMAP), RFID mutual Authentication Protocol with Permutation (RAPP) and kazahaya authentication protocols are analyzed. These authentication protocols are modeled to analyze the delays using lightweight modeling language. Delay analysis is performed using alloy model over LMAP, RAPP and kazahaya authentication protocols where one datacenter (DC) is connected to different number of readers (1,5 or 10) with connectivity to 1, 5 or 25 tags associated with reader and its results show that for LMAP delay varies from 30-156 msec, for RAPP from 31-188 while for kazahaya from 61-374 msec. Further, performance of RFID authentication protocols is analyzed for group construction through more than one DC (1,5 or 10) with different number of readers (10, 50 or 100) and tags associated with these readers (50, 500, 1000) and results show that DC based binary tree topology with LMAP authentication protocol is having a minimum delay for 50 or 100 readers. Other authentication protocols fail to give authentication results because of large delays in the network. Thus, RAPP and Kazahaya are not suitable for scenarios where there is large amount of increase in number of tags or readers.
APA, Harvard, Vancouver, ISO, and other styles
19

Mikami, Shugo, Dai Watanabe, Yang Li, and Kazuo Sakiyama. "Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol." Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/498610.

Full text
Abstract:
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.
APA, Harvard, Vancouver, ISO, and other styles
20

Raju, Mehedi Hasan, Mosabber Uddin Ahmed, and Md Atiqur Rahman Ahad. "MUMAP: Modified Ultralightweight Mutual Authentication protocol for RFID enabled IoT networks." Journal of the Institute of Industrial Applications Engineers 9, no. 2 (April 25, 2021): 33–39. http://dx.doi.org/10.12792/jiiae.9.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zhu, Feng, Peng Li, He Xu, and Ruchuan Wang. "A Lightweight RFID Mutual Authentication Protocol with PUF." Sensors 19, no. 13 (July 4, 2019): 2957. http://dx.doi.org/10.3390/s19132957.

Full text
Abstract:
Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable functions that can ensure an anti-counterfeiting feature. However, most of the existing schemes require secret parameters to be stored in tags, which are vulnerable to physical attacks that can further lead to the breach of forward secrecy. Furthermore, as far as we know, none of the existing schemes are able to solve the security and privacy problems with good scalability. Since many existing schemes rely on exhaustive searches of the backend server to validate a tag and they are not scalable for applications with a large scale database. Hence, in this paper, we propose a lightweight RFID mutual authentication protocol with physically unclonable functions (PUFs). The performance analysis shows that our proposed scheme can ensure security and privacy efficiently in a scalable way.
APA, Harvard, Vancouver, ISO, and other styles
22

ZHANG, Xue-jun, Wen-qi CAI, and Yu WANG. "Enhanced minimalist mutual-authentication protocol for RFID system." Journal of Computer Applications 32, no. 9 (May 13, 2013): 2395–99. http://dx.doi.org/10.3724/sp.j.1087.2012.02395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Shemaili, Mouza Ahmad Bani, Chan Yeob Yeun, and Mohamed Jamal Zemerly. "Lightweight mutual authentication protocol for securing RFID applications." International Journal of Internet Technology and Secured Transactions 2, no. 3/4 (2010): 205. http://dx.doi.org/10.1504/ijitst.2010.037402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Oh, Sejin, and Taejin Yun. "An RFID Mutual Authentication Protocol Using Tag’s ID." Journal of Security Engineering 14, no. 4 (August 31, 2017): 281–92. http://dx.doi.org/10.14257/jse.2017.08.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hussein, Issam, Ramzy Ali, and Basil Jasim. "Design and Implementation of RFID Active Tags and Mutual Authentication Protocol with Ownership Transfer Stage." Iraqi Journal for Electrical and Electronic Engineering 13, no. 1 (June 1, 2017): 83–103. http://dx.doi.org/10.37917/ijeee.13.1.11.

Full text
Abstract:
Radio frequency identification (RFID) technology is being used widely in the last few years. Its applications classifies into auto identification and data capturing issues. The purpose of this paper is to design and implement RFID active tags and reader using microcontroller ATmega328 and 433 MHz RF links. The paper also includes a proposed mutual authentication protocol between RFID reader and active tags with ownership transfer stage. Our protocol is a mutual authentication protocol with tag’s identifier updating mechanism. The updating mechanism has the purpose of providing forward security which is important in any authentication protocol to prevent the attackers from tracking the past transactions of the compromised tags. The proposed protocol gives the privacy and security against all famous attacks that RFID system subjected for due to the transfer of data through unsecure wireless channel, such as replay, denial of service, tracking and cloning attacks. It also ensures ownership privacy when the ownership of the tag moves to a new owner.
APA, Harvard, Vancouver, ISO, and other styles
26

Shi, Zhi Cai, Jin Zu Zhou, Yong Xiang Xia, and Chao Gang Yu. "A Novel RFID Authentication Protocol Based on NTRU." Applied Mechanics and Materials 411-414 (September 2013): 16–20. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.16.

Full text
Abstract:
RFID is a key technology that can be used to create the ubiquitous society. Owing to the characteristics of RFID systems, it may pose a serious threat to privacy and security. In order to solve these problems we proposed a novel mutual authentication protocol based on NTRU which can prevent tracing, eavesdropping, replay attack, and backward traceability effectively. This protocol uses less computing and memory resources, and it is very suitable to some low-cost RFID systems.
APA, Harvard, Vancouver, ISO, and other styles
27

Xiao, Liang, He Xu, Feng Zhu, Ruchuan Wang, and Peng Li. "SKINNY-Based RFID Lightweight Authentication Protocol." Sensors 20, no. 5 (March 2, 2020): 1366. http://dx.doi.org/10.3390/s20051366.

Full text
Abstract:
With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive attention. In traditional RFID systems, the communication channel between the tag and the reader is vulnerable to various threats, including denial of service, spoofing, and desynchronization. Thus, the confidentiality and integrity of the transmitted data cannot be guaranteed. In order to solve these security problems, in this paper, we propose a new RFID authentication protocol based on a lightweight block cipher algorithm, SKINNY, (short for LRSAS). Security analysis shows that the LRSAS protocol guarantees mutual authentication and is resistant to various attacks, such as desynchronization attacks, replay attacks, and tracing attacks. Performance evaluations show that the proposed solution is suitable for low-cost tags while meeting security requirements. This protocol reaches a balance between security requirements and costs.
APA, Harvard, Vancouver, ISO, and other styles
28

Dong, Qingkuan, Jiaqing Tong, and Yuan Chen. "Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud." International Journal of Distributed Sensor Networks 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/937198.

Full text
Abstract:
With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems. In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. Therefore, the users have to encrypt their data stored in the cloud database to prevent the leakage of privacy. In addition, the reader’s location privacy should be protected to avoid its leak to the cloud provider. In this paper, a cloud-based RFID mutual authentication protocol without leaking location privacy to the cloud is proposed. It provides real-time mutual authentication between the reader and the tag and protects the reader’s location privacy by introducing the location privacy cloud. Compared with traditional backend-server-based schemes and serverless schemes, the proposed scheme has obvious advantages in deployment cost, scalability, real-time authentication, and the tag’s computational complexity.
APA, Harvard, Vancouver, ISO, and other styles
29

Fang, Ming Wei, Jun Jun Wu, Xin Fang Zhang, and Hong Chen. "A Novel ECC-Based RFID Authentication Protocol." Key Engineering Materials 474-476 (April 2011): 1764–69. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.1764.

Full text
Abstract:
RFID technology plays an important role in our daily life nowadays. It widely used in the automatic identification system by embedding the tag into product. However, some security risks presented due to radio frequency signal channel between the tag and the reader which may lead privacy disclosure for the user. Various solutions are proposed to resole to security issues in RFID system, but there still presented some limitations. A security elliptic curve cryptography based authentication protocol is presented in this paper to preserve the privacy of the RFID system. The proposed protocol provides mutual authentication and a security communication channel between the tag and the reader. By the security analysis, our protocol can resist common passive and active attack; moreover, it also can provide forward security.
APA, Harvard, Vancouver, ISO, and other styles
30

Lee, Young-Seok, and Hoon Choi. "Tag-Reader Mutual Authentication Protocol for secure RFID environments." Journal of the Korea Institute of Information and Communication Engineering 19, no. 2 (February 28, 2015): 357–64. http://dx.doi.org/10.6109/jkiice.2015.19.2.357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Omer, Ashrar A., Johnson P. Thomas, and Ling Zhu. "Mutual authentication protocols for RFID systems." International Journal of Automation and Computing 5, no. 4 (October 2008): 348–65. http://dx.doi.org/10.1007/s11633-008-0348-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gamal Ahmed, Eslam, Eman Shaaban, and Mohamed Hashem. "Lightweight Mutual Authentication Protocol for Low Cost RFID Tags." International journal of Network Security & Its Applications 2, no. 2 (April 25, 2010): 27–37. http://dx.doi.org/10.5121/ijnsa.2010.2203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Maurya, Pramod Kumar, and Satya Bagchi. "Cyclic group based mutual authentication protocol for RFID system." Wireless Networks 26, no. 2 (October 9, 2018): 1005–15. http://dx.doi.org/10.1007/s11276-018-1850-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Dehkordi, Masoud Hadian, and Yousof Farzaneh. "Improvement of the Hash-Based RFID Mutual Authentication Protocol." Wireless Personal Communications 75, no. 1 (August 25, 2013): 219–32. http://dx.doi.org/10.1007/s11277-013-1358-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ayebie, Edoukou Berenger, and El Mamoun Souidi. "Rank-metric code-based mutual authentication protocol for RFID." Journal of Information Security and Applications 55 (December 2020): 102598. http://dx.doi.org/10.1016/j.jisa.2020.102598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Fu, Qi, Jun Tan, and Hong Li. "Design and Analysis of a New Mutual Authentication Protocol for RFID." Advanced Materials Research 1006-1007 (August 2014): 548–51. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.548.

Full text
Abstract:
This paper proposes a lightweight mutual authentication protocol for RFID. Based on the simple bit operations, it creates the random number N1 on the tag and the identifier RID on reader to protect the transmission of information, and proves the protocol security at the end. The results show that the proposed protocol can meet the security requirements of confidentiality, integrity, and traceability in RFID applications. Furthermore, the protocol can resist attacks of tracking, eavesdropping, retransmitting and the denial of service, which makes up the security defects mentioned on this paper.
APA, Harvard, Vancouver, ISO, and other styles
37

Mujahid, Umar, M. Najam-ul-Islam, and Madiha Khalid. "Efficient Hardware Implementation of KMAP+: An Ultralightweight Mutual Authentication Protocol." Journal of Circuits, Systems and Computers 27, no. 02 (September 11, 2017): 1850033. http://dx.doi.org/10.1142/s0218126618500330.

Full text
Abstract:
Internet of Things (IoTs) are becoming one of the integral parts of our lives, as all of the modern devices including pervasive systems use internet for its connectivity with the rest of the world. The Radio Frequency IDentification (RFID) provides unique identification and nonline of sight capabilities, therefore plays a very important role in development of IoTs. However, the RFID systems incorporate wireless channel for communication, therefore have some allied risks to the system from threat agents. In order to prevent the system from malicious activities in a cost effective way, numerous Ultralightweight Mutual Authentication Protocols (UMAPs) have been proposed since last decade. These UMAPs mainly involve simple bitwise logical operators such as XOR, AND, OR, etc., in their designs and can be implemented with extremely low cost RFID tags. However, most of the UMAP designers didn’t provide the proper hardware approximations of their UMAPs and presented only theoretical results which mostly mislead the reader. In this paper, we have addressed this problem by reporting our experiences with FPGA and ASIC-based implementation of UMAP named psuedo Kasami code-based Mutual Authentication Protocol (KMAP[Formula: see text]. Further, we have also improved the structure of the KMAP protocol to overcome the previously highlighted attack model. The hardware implementation results show that KMAP[Formula: see text] successfully conform to EPC-C1G2 tags and can be implemented using less than 4[Formula: see text]K GE (for 32-bit word length).
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Xiao Hong, Hui Qin Wang, and He Bo. "RFID Authentication and Communication Protocol Based on the Dynamic Active Tag ID and Key." Applied Mechanics and Materials 336-338 (July 2013): 1913–19. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.1913.

Full text
Abstract:
The reliability of Radio Frequency Identification (RFID) mechanism is disturbed by illegal tracking and information intercepted.The paper proposed a new active RFID authentication protocol based on the dynamic tag ID and encryption key,which transforms the tag ID using chaotic transformation during authentication and communication between the reader and tags,and realizes mutual authentication of the reader and tags.Through the analysis of security, the protocol not only can ensure the integrity, fresh and confidentiality of data, but also can effectively prevent illegal tracking labels and replay attack.
APA, Harvard, Vancouver, ISO, and other styles
39

Li, Shu, Xi Yang, and Ping Yuan Liang. "A New Hash-Based Authentication Protocol for RFID Using Varying Identifiers." Applied Mechanics and Materials 303-306 (February 2013): 2112–16. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2112.

Full text
Abstract:
This article proposed a new security protocol with satisfying the lightweight requirements of the security of RFID system. Using varying identifiers, the protocol can resist Forward attack, Traffic analysis and Tracking attack, Replay attack. The Back-end Server holds the new identifier and last identifier for every Tag can keep database synchronization. Each Tag store a unique Key that is the secret information which also store in the Back-end Server. Use the Key, the protocol can implement mutual authentication between Back-end Server and Tag. Then the paper compared the proposed protocol with the typical protocols in security, effective and cost. The results demonstrate that the protocol can effectively solve the security problem of RFID systems.
APA, Harvard, Vancouver, ISO, and other styles
40

Shin, Ju-Seok, Se-Jin Oh, Cheol-Ho Jeong, Kyung-Ho Chung, and Kwang-Seon Ahn. "Improved An RFID Mutual Authentication Protocol Based on Hash Function." Journal of Korean Institute of Communications and Information Sciences 37, no. 3C (March 30, 2012): 241–50. http://dx.doi.org/10.7840/kics.2012.37c.3.241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Oh, Se-Jin, Kyung-Ho Chung, Tae-Jin Yun, and Kwang-Seon Abn. "An RFID Mutual Authentication Protocol Using One-Time Random Number." Journal of Korean Institute of Communications and Information Sciences 36, no. 7B (July 30, 2011): 858–67. http://dx.doi.org/10.7840/kics.2011.36b.7.858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kim, Young-Back, Sung-Soo Kim, Kyung-Ho Chung, Soo-Yong Kim, Tae-Jin Yun, and Kwang-Seon Ahn. "A Vulnerability Analysis of Multi-Context RFID Mutual Authentication Protocol." Journal of the Korea Society of Computer and Information 18, no. 10 (October 31, 2013): 71–80. http://dx.doi.org/10.9708/jksci.2013.18.10.071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Bing-Chang, Her-Tyan Yeh, and Che-Chiang Wang. "The construction of mobile RFID authentication mechanism and relative ownership transfer protocols for supply chain." Engineering Computations 33, no. 6 (August 1, 2016): 1825–34. http://dx.doi.org/10.1108/ec-08-2015-0252.

Full text
Abstract:
Purpose – The purpose of this paper is to complete the following works: construct RFID integration mechanism in the supply chain; build mutual authentication mechanism; and build the transfer mechanism in supply chain. Design/methodology/approach – In order to transfer RFID tag information to others safely in mobile RFID supply chain circumstances, the authors propose a RFID authentication mechanism which can ensure the identity and make the mutual authentication. Moreover, the authors propose a secure transfer method of ownership for the specific role in different regions under the structure of Mobile RFID. Findings – The task of administrator server is to check the order, store the merchandise information, distribute the authority, certify the security and transfer the ownership. It can make the whole supply chain more mobility, and transfer faster. Originality/value – The goals of this research are to achieve mainly: using mobile RFID system to design secure mutual authentication mechanism, transfer mechanisms with faster transfer and authority distribution. The authors introduce the security authentication and competence transfer mechanism in supply chain.
APA, Harvard, Vancouver, ISO, and other styles
44

Jingxian Zhou, Yajian Zhou, Feng Xiao, Miao Zhang, and Xinxin Niu. "Efficient and Secure RFID Mutual Authentication Protocol without Sharing Key." International Journal of Advancements in Computing Technology 4, no. 15 (September 30, 2012): 319–27. http://dx.doi.org/10.4156/ijact.vol4.issue15.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bassil, Ramzi, Wissam El-Beaino, Wassim Itani, Ayman Kayssi, and Ali Chehab. "PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol." International Journal of RFID Security and Cryptography 2, no. 1 (June 1, 2013): 58–66. http://dx.doi.org/10.20533/ijrfidsc.2046.3715.2013.0008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Bandal, Amol. "RFID Security Using Lightweight Mutual Authentication and Ownership Transfer Protocol." International Journal of Ad hoc, Sensor & Ubiquitous Computing 3, no. 3 (June 30, 2012): 123–33. http://dx.doi.org/10.5121/ijasuc.2012.3309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

ZHANG, Nan, and Jianhua ZHANG. "Research and security analysis on open RFID mutual authentication protocol." Journal of Computer Applications 33, no. 1 (September 22, 2013): 131–34. http://dx.doi.org/10.3724/sp.j.1087.2013.00131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Pateriya, R. K., and Sangeeta Sharma. "An Ultralightweight Mutual Authentication Protocol for Low Cost RFID Tags." International Journal of Computer Applications 25, no. 10 (July 31, 2011): 28–35. http://dx.doi.org/10.5120/3148-4352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Sun, Da-Zhi, and Ji-Dong Zhong. "Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol." Wireless Personal Communications 91, no. 3 (July 23, 2016): 1085–93. http://dx.doi.org/10.1007/s11277-016-3513-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Sidorov, Michail, Ming Tze Ong, Ravivarma Vikneswaren Sridharan, Junya Nakamura, Ren Ohmura, and Jing Huey Khor. "Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains." IEEE Access 7 (2019): 7273–85. http://dx.doi.org/10.1109/access.2018.2890389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography