Turksonmez et al., 2023 - Google Patents
Enhancing security of RFID-enabled IoT supply chainTurksonmez et al., 2023
View PDF- Document ID
- 12941227065053243709
- Author
- Turksonmez H
- Ozcanhan M
- Publication year
- Publication venue
- Malaysian Journal of Computer Science
External Links
Snippet
In addition to its benefits, the popular Internet of Things (IoT) technology has also opened the way to novel security and privacy issues. The basis of IoT security and privacy starts with trust in the IoT hardware and its supply chain. Counterfeiting, cloning, tampering of …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alladi et al. | SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication | |
Yang et al. | Protecting endpoint devices in IoT supply chain | |
US8667283B2 (en) | Soft message signing | |
Lounis et al. | Lessons learned: Analysis of PUF-based authentication protocols for IoT | |
Konidala et al. | A simple and cost-effective RFID tag-reader mutual authentication scheme | |
Toiruul et al. | An advanced mutual-authentication algorithm using AES for RFID systems | |
JP2020530726A (en) | NFC tag authentication to remote servers with applications that protect supply chain asset management | |
Sadeghi et al. | User privacy in transport systems based on RFID e-tickets | |
Griffin | Telebiometric authentication objects | |
Yang et al. | ReSC: An RFID-enabled solution for defending IoT supply chain | |
Turksonmez et al. | Enhancing security of RFID-enabled IoT supply chain | |
Nyangaresi et al. | Anonymous authentication scheme based on physically unclonable function and biometrics for smart cities | |
CN110650019B (en) | RFID authentication method and system based on PUF and security sketch | |
CN116090489A (en) | Bidirectional authentication method of RFID system and RFID system | |
Lounis et al. | More lessons: Analysis of PUF-based authentication protocols for IoT | |
CN115278620A (en) | RFID data security authentication method and system based on random rearrangement block matrix encryption | |
Huang et al. | RFID systems integrated OTP security authentication design | |
Taqieddin et al. | Tag ownership transfer in radio frequency identification systems: A survey of existing protocols and open challenges | |
Shi et al. | The Lightweight RFID Grouping‐Proof Protocols with Identity Authentication and Forward Security | |
Özcanhan et al. | A Strong Mutual Authentication Protocol for SHIELD. | |
KR101162626B1 (en) | A secure and efficient method and RFID reader device of searching a RFID tag | |
Eghdamian et al. | A secure protocol for ultralightweight radio frequency identification (RFID) tags | |
Yin et al. | Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking in 5G | |
Picazo‐Sanchez et al. | Weaknesses of fingerprint‐based mutual authentication protocol | |
Türksönmez | Enhancing Security of Low-Cost Resource Stricken IOT Devices and Gateways |