[go: up one dir, main page]

Aghili et al., 2018 - Google Patents

DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT

Aghili et al., 2018

Document ID
17321323585675441956
Author
Aghili S
Ashouri-Talouki M
Mala H
Publication year
Publication venue
The Journal of Supercomputing

External Links

Snippet

In recent years, RFID (radio-frequency identification) systems are widely used in many applications. One of the most important applications for this technology is the Internet of things (IoT). Therefore, researchers have proposed several authentication protocols that can …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Aghili et al. DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT
Anandhi et al. IoT enabled RFID authentication and secure object tracking system for smart logistics
Alamr et al. A secure ECC-based RFID mutual authentication protocol for internet of things
Li et al. A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system
He et al. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol
Song et al. Scalable RFID security protocols supporting tag ownership transfer
Li et al. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
Srivastava et al. A hash based mutual RFID tag authentication protocol in telecare medicine information system
Banerjee et al. An enhanced and secure biometric based user authentication scheme in wireless sensor networks using smart cards
Kumar et al. Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing
Gao et al. URAP: A new ultra-lightweight RFID authentication protocol in passive RFID system
Dehkordi et al. Improvement of the hash-based RFID mutual authentication protocol
Al Sibahee et al. Stochastic security ephemeral generation protocol for 5G enabled Internet of Things
Alavi et al. Traceability analysis of recent RFID authentication protocols
Chen et al. A secure ownership transfer protocol using EPCglobal Gen-2 RFID
Anandhi et al. An authentication protocol to track an object with multiple RFID tags using cloud computing environment
Lv et al. Vulnerability analysis of elliptic curve cryptography‐based RFID authentication protocols
Benssalah et al. Security enhancement of the authenticated RFID security mechanism based on chaotic maps
Maurya et al. A secure PUF-based unilateral authentication scheme for RFID system
Anandhi et al. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment
Zhou et al. A lightweight anti-desynchronization RFID authentication protocol
Lee et al. A novel group ownership delegate protocol for RFID systems
Saxena et al. Secure-AKA: An efficient AKA protocol for UMTS networks
Maurya et al. A coding theory based ultralightweight RFID authentication protocol with CRC
Liu et al. Efficient group authentication in RFID using secret sharing scheme