Aghili et al., 2018 - Google Patents
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoTAghili et al., 2018
- Document ID
- 17321323585675441956
- Author
- Aghili S
- Ashouri-Talouki M
- Mala H
- Publication year
- Publication venue
- The Journal of Supercomputing
External Links
Snippet
In recent years, RFID (radio-frequency identification) systems are widely used in many applications. One of the most important applications for this technology is the Internet of things (IoT). Therefore, researchers have proposed several authentication protocols that can …
- 230000001010 compromised 0 abstract description 14
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aghili et al. | DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT | |
Anandhi et al. | IoT enabled RFID authentication and secure object tracking system for smart logistics | |
Alamr et al. | A secure ECC-based RFID mutual authentication protocol for internet of things | |
Li et al. | A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system | |
He et al. | Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol | |
Song et al. | Scalable RFID security protocols supporting tag ownership transfer | |
Li et al. | A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems | |
Srivastava et al. | A hash based mutual RFID tag authentication protocol in telecare medicine information system | |
Banerjee et al. | An enhanced and secure biometric based user authentication scheme in wireless sensor networks using smart cards | |
Kumar et al. | Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing | |
Gao et al. | URAP: A new ultra-lightweight RFID authentication protocol in passive RFID system | |
Dehkordi et al. | Improvement of the hash-based RFID mutual authentication protocol | |
Al Sibahee et al. | Stochastic security ephemeral generation protocol for 5G enabled Internet of Things | |
Alavi et al. | Traceability analysis of recent RFID authentication protocols | |
Chen et al. | A secure ownership transfer protocol using EPCglobal Gen-2 RFID | |
Anandhi et al. | An authentication protocol to track an object with multiple RFID tags using cloud computing environment | |
Lv et al. | Vulnerability analysis of elliptic curve cryptography‐based RFID authentication protocols | |
Benssalah et al. | Security enhancement of the authenticated RFID security mechanism based on chaotic maps | |
Maurya et al. | A secure PUF-based unilateral authentication scheme for RFID system | |
Anandhi et al. | An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment | |
Zhou et al. | A lightweight anti-desynchronization RFID authentication protocol | |
Lee et al. | A novel group ownership delegate protocol for RFID systems | |
Saxena et al. | Secure-AKA: An efficient AKA protocol for UMTS networks | |
Maurya et al. | A coding theory based ultralightweight RFID authentication protocol with CRC | |
Liu et al. | Efficient group authentication in RFID using secret sharing scheme |