[go: up one dir, main page]

Turksonmez et al., 2023 - Google Patents

Enhancing security of RFID-enabled IoT supply chain

Turksonmez et al., 2023

View PDF
Document ID
12941227065053243709
Author
Turksonmez H
Ozcanhan M
Publication year
Publication venue
Malaysian Journal of Computer Science

External Links

Snippet

In addition to its benefits, the popular Internet of Things (IoT) technology has also opened the way to novel security and privacy issues. The basis of IoT security and privacy starts with trust in the IoT hardware and its supply chain. Counterfeiting, cloning, tampering of …
Continue reading at jupidi.um.edu.my (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Similar Documents

Publication Publication Date Title
Alladi et al. SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication
Yang et al. Protecting endpoint devices in IoT supply chain
US8667283B2 (en) Soft message signing
Lounis et al. Lessons learned: Analysis of PUF-based authentication protocols for IoT
Konidala et al. A simple and cost-effective RFID tag-reader mutual authentication scheme
Toiruul et al. An advanced mutual-authentication algorithm using AES for RFID systems
JP2020530726A (en) NFC tag authentication to remote servers with applications that protect supply chain asset management
Sadeghi et al. User privacy in transport systems based on RFID e-tickets
Griffin Telebiometric authentication objects
Yang et al. ReSC: An RFID-enabled solution for defending IoT supply chain
Turksonmez et al. Enhancing security of RFID-enabled IoT supply chain
Nyangaresi et al. Anonymous authentication scheme based on physically unclonable function and biometrics for smart cities
CN110650019B (en) RFID authentication method and system based on PUF and security sketch
CN116090489A (en) Bidirectional authentication method of RFID system and RFID system
Lounis et al. More lessons: Analysis of PUF-based authentication protocols for IoT
CN115278620A (en) RFID data security authentication method and system based on random rearrangement block matrix encryption
Huang et al. RFID systems integrated OTP security authentication design
Taqieddin et al. Tag ownership transfer in radio frequency identification systems: A survey of existing protocols and open challenges
Shi et al. The Lightweight RFID Grouping‐Proof Protocols with Identity Authentication and Forward Security
Özcanhan et al. A Strong Mutual Authentication Protocol for SHIELD.
KR101162626B1 (en) A secure and efficient method and RFID reader device of searching a RFID tag
Eghdamian et al. A secure protocol for ultralightweight radio frequency identification (RFID) tags
Yin et al. Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking in 5G
Picazo‐Sanchez et al. Weaknesses of fingerprint‐based mutual authentication protocol
Türksönmez Enhancing Security of Low-Cost Resource Stricken IOT Devices and Gateways