Journal ArticleDOI
RFID mutual authentication protocols
Selwyn Piramuthu
- Vol. 50, Iss: 2, pp 387-393
TLDR
This work considers a stream of publications among these that consider mutual authentication of tag and reader, and identifies some existing vulnerabilities.Abstract:
As RFID-tagged systems become ubiquitous, the acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past six years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. We consider a stream of publications among these that consider mutual authentication of tag and reader, and identify some existing vulnerabilities.read more
Citations
More filters
Journal ArticleDOI
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment
TL;DR: This paper has put forwarded an RFID-based authentication architecture for distributed IoT (Internet of Things) applications suitable for the future smart city environments and designed for IoT-based infrastructure in smart city environment.
Journal ArticleDOI
A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
Prosanta Gope,Tzonelih Hwang +1 more
TL;DR: This article proposes a realistic lightweight authentication protocol for RFID system, which can ensure various imperative security properties such as anonymity of the RFID tag, untraceability, forward security etc.
Journal ArticleDOI
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
Khwaja Mansoor,Anwar Ghani,Shehzad Ashraf Chaudhry,Shahaboddin Shamshirband,Shahbaz Ahmed Khan Ghayyur,Amir Mosavi,Amir Mosavi +6 more
TL;DR: This article presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks and outperforms the competing protocols in terms of security.
Journal ArticleDOI
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications
TL;DR: This work proposes a novel and lightweight RFID authentication scheme with cloud for e-healthcare applications that not only resists the common attacks, but also keeps mutual authentication, information integrity, forward untraceability and backwardUntraceability.
Journal ArticleDOI
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
Pascal Urien,Selwyn Piramuthu +1 more
TL;DR: This work provides an overview of existing literature on addressing relay attacks through ambient condition measurements and proposes an elliptic curve-based mutual authentication protocol that addresses relay attacks based on the surface temperature of the prover as measured by prover and verifier and measured single-bit round-trip times.
References
More filters
Cryptographic Approach to “Privacy-Friendly” Tags
TL;DR: This paper discusses and clarifies the requirements and restrictions of RFID systems, and suggests the use of the previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism.
Journal ArticleDOI
Secure and Serverless RFID Authentication and Search Protocols
Chiu C. Tan,Bo Sheng,Qun Li +2 more
TL;DR: A more flexible authentication protocol that provides comparable protection without the need for a central database is proposed and a protocol for secure search for RFID tags is suggested.
Proceedings Article
Mutual Authentication Protocol for Low-cost RFID
TL;DR: I am grateful to Prof. Adi Shamir of the Weizmann Institute in Israel for his precious comments and kind advice on the authors' protocol during his visit to ICU during Asiacryt2004.
Journal ArticleDOI
Identifying RFID-embedded objects in pervasive healthcare applications
TL;DR: This work considers Radio Frequency Identification (RFID) tags, which are increasingly being used in pervasive healthcare applications, and proposes and illustrates several algorithms for locating and identifying the presence of a tag in such systems.
Journal ArticleDOI
Protocols for RFID tag/reader authentication
TL;DR: This work studies and evaluates a few protocols from each of those streams approaching the RFID tag/reader privacy/security problem from different perspectives, identifies possible vulnerabilities, and provides alternate solutions when possible.