RFID systems: A survey on security threats and proposed solutions

P Peris-Lopez, JC Hernandez-Castro… - … : IFIP TC6 11th …, 2006 - Springer
Abstract Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as
smart labels are emerging as one of the most pervasive computing technology in history …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions

P Gope, J Lee, TQS Quek - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Radio frequency identification (RFID) has been considered one of the imperative
requirements for implementation of Internet-of-Things applications. It helps to solve the …

SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity

HY Chien - IEEE transactions on dependable and secure …, 2007 - ieeexplore.ieee.org
As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight
RFID authentication protocols to resist all possible attacks and threats. However, all of the …

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

P Gope, R Amin, SKH Islam, N Kumar… - Future Generation …, 2018 - Elsevier
With the rapid development of device-to-device and machine-to-machine communication,
there is an exponential increase in the usage of various smart applications, such as …

From identification to authentication–a review of RFID product authentication techniques

M Lehtonen, T Staake, F Michahelles - Networked RFID Systems and …, 2008 - Springer
Authentication has an important role in many RFID applications for providing security and
privacy. In this paper we focus on investigating how RFID can be used in product …

Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards

HY Chien, CH Chen - Computer Standards & Interfaces, 2007 - Elsevier
As low-cost Radio Frequency Identification (RFID) will become pervasive in our daily lives,
RFID systems may create new threats to the security and privacy of individuals and …

[PDF][PDF] LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags

P Peris-Lopez… - Proc. of 2nd …, 2006 - rfidsec2013.iaik.tugraz.at
Low-cost Radio Frequency Identification (RFID) tags are devices of very limited
computational capabilities, where only 250-3K logic gates can be devoted to security-related …

M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags

P Peris-Lopez, JC Hernandez-Castro… - … and Computing: Third …, 2006 - Springer
Abstract Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as
smart labels are emerging as one of the most pervasive computing technologies in history …

EMAP: An efficient mutual-authentication protocol for low-cost RFID tags

P Peris-Lopez, JC Hernandez-Castro… - On the Move to …, 2006 - Springer
RFID tags are devices of very limited computational capabilities, which only have 250-3K
logic gates that can be devoted to security-related tasks. Many proposals have recently …