Journal ArticleDOI
A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
Prosanta Gope,Tzonelih Hwang +1 more
Reads0
Chats0
TLDR
This article proposes a realistic lightweight authentication protocol for RFID system, which can ensure various imperative security properties such as anonymity of the RFID tag, untraceability, forward security etc.About:
This article is published in Computers & Security.The article was published on 2015-11-01. It has received 69 citations till now. The article focuses on the topics: Radio-frequency identification & Authentication protocol.read more
Citations
More filters
Journal ArticleDOI
BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network
Prosanta Gope,Tzonelih Hwang +1 more
TL;DR: This paper highlights the major security requirements in BSN-based modern healthcare system and proposes a secure IoT-based healthcare system using BSN, called B SN-Care, which can efficiently accomplish those requirements.
Journal ArticleDOI
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope,Tzonelih Hwang +1 more
TL;DR: This paper demonstrates that the existing solutions for anonymous user authentication in WSN are impractical, and proposes a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc.
Journal ArticleDOI
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
TL;DR: This paper proposes a lightweight privacy-preserving authentication protocol for the RFID system by considering the ideal PUF environment, and introduces an enhanced protocol which can support the noisyPUF environment.
Journal ArticleDOI
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment
TL;DR: This paper has put forwarded an RFID-based authentication architecture for distributed IoT (Internet of Things) applications suitable for the future smart city environments and designed for IoT-based infrastructure in smart city environment.
Journal ArticleDOI
Cybersecurity challenges in vehicular communications
Zeinab El-Rewini,Karthikeyan Sadatsharan,Daisy Flora Selvaraj,Siby Jose Plathottam,Prakash Ranganathan +4 more
TL;DR: A three-layer framework (sensing, communication and control) through which automotive security threats can be better understood is proposed, which provides the state-of-the-art review on attacks and threats relevant to the communication layer and presents countermeasures.
References
More filters
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Journal ArticleDOI
A logic of authentication
TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Journal ArticleDOI
RFID security and privacy: a research survey
TL;DR: This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Proceedings ArticleDOI
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
TL;DR: This work presents an RFID authentication protocol that enforces user privacy and protects against tag cloning, and shows how forward privacy is guaranteed; messages seen today will still be valid in the future, even after the tag has been compromised.
Proceedings ArticleDOI
State of the art in ultra-low power public key cryptography for wireless sensor networks
TL;DR: This paper shows that special purpose ultra-low power hardware implementations of public key algorithms can be used on sensor nodes and provides an in-depth comparison of three popular public key implementations and describes how four fundamental security services benefit from PKC.
Related Papers (5)
Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks
Prosanta Gope,Tzonelih Hwang +1 more