scispace - formally typeset
Journal ArticleDOI

A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system

Prosanta Gope, +1 more
- 01 Nov 2015 - 
- Vol. 55, pp 271-280
Reads0
Chats0
TLDR
This article proposes a realistic lightweight authentication protocol for RFID system, which can ensure various imperative security properties such as anonymity of the RFID tag, untraceability, forward security etc.
About
This article is published in Computers & Security.The article was published on 2015-11-01. It has received 69 citations till now. The article focuses on the topics: Radio-frequency identification & Authentication protocol.

read more

Citations
More filters
Journal ArticleDOI

BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network

TL;DR: This paper highlights the major security requirements in BSN-based modern healthcare system and proposes a secure IoT-based healthcare system using BSN, called B SN-Care, which can efficiently accomplish those requirements.
Journal ArticleDOI

A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

TL;DR: This paper demonstrates that the existing solutions for anonymous user authentication in WSN are impractical, and proposes a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc.
Journal ArticleDOI

Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions

TL;DR: This paper proposes a lightweight privacy-preserving authentication protocol for the RFID system by considering the ideal PUF environment, and introduces an enhanced protocol which can support the noisyPUF environment.
Journal ArticleDOI

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

TL;DR: This paper has put forwarded an RFID-based authentication architecture for distributed IoT (Internet of Things) applications suitable for the future smart city environments and designed for IoT-based infrastructure in smart city environment.
Journal ArticleDOI

Cybersecurity challenges in vehicular communications

TL;DR: A three-layer framework (sensing, communication and control) through which automotive security threats can be better understood is proposed, which provides the state-of-the-art review on attacks and threats relevant to the communication layer and presents countermeasures.
References
More filters
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Journal ArticleDOI

RFID security and privacy: a research survey

TL;DR: This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Proceedings ArticleDOI

A Lightweight RFID Protocol to protect against Traceability and Cloning attacks

T. Dimitriou
TL;DR: This work presents an RFID authentication protocol that enforces user privacy and protects against tag cloning, and shows how forward privacy is guaranteed; messages seen today will still be valid in the future, even after the tag has been compromised.
Proceedings ArticleDOI

State of the art in ultra-low power public key cryptography for wireless sensor networks

TL;DR: This paper shows that special purpose ultra-low power hardware implementations of public key algorithms can be used on sensor nodes and provides an in-depth comparison of three popular public key implementations and describes how four fundamental security services benefit from PKC.
Related Papers (5)