Lightweight RFID authentication with forward and backward security
Citations
192 citations
97 citations
55 citations
Cites background from "Lightweight RFID authentication wit..."
...Meanwhile, GUPA is analyzed to be robust enough to resist major attacks such as replay, forgery, tracking, and denial of proof....
[...]
41 citations
Cites methods from "Lightweight RFID authentication wit..."
...Improved versions of SSG by Molina-Gil et al. [19] resolve the linearity issues in SSG and Tasheva et al. [20] proves the resistance to exhaustive search and entropy attacks....
[...]
...In addition to using the strength of PRNG to resist online attacks [23], each entity involved in our protocol verifies the integrity of the messages it receives in each step, thereby ensuring that the messages have not been tampered during transmission....
[...]
32 citations
Cites background from "Lightweight RFID authentication wit..."
...Apart solutions from cryptography, specific security model based requirements for authentication is considered to be a valid choice [13]....
[...]
References
13,597 citations
3,579 citations
3,059 citations
2,202 citations
2,043 citations