RFID systems: A survey on security threats and proposed solutions
Abstract Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as
smart labels are emerging as one of the most pervasive computing technology in history …
smart labels are emerging as one of the most pervasive computing technology in history …
Review on security of internet of things authentication mechanism
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions
Radio frequency identification (RFID) has been considered one of the imperative
requirements for implementation of Internet-of-Things applications. It helps to solve the …
requirements for implementation of Internet-of-Things applications. It helps to solve the …
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
HY Chien - IEEE transactions on dependable and secure …, 2007 - ieeexplore.ieee.org
As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight
RFID authentication protocols to resist all possible attacks and threats. However, all of the …
RFID authentication protocols to resist all possible attacks and threats. However, all of the …
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment
With the rapid development of device-to-device and machine-to-machine communication,
there is an exponential increase in the usage of various smart applications, such as …
there is an exponential increase in the usage of various smart applications, such as …
From identification to authentication–a review of RFID product authentication techniques
Authentication has an important role in many RFID applications for providing security and
privacy. In this paper we focus on investigating how RFID can be used in product …
privacy. In this paper we focus on investigating how RFID can be used in product …
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
HY Chien, CH Chen - Computer Standards & Interfaces, 2007 - Elsevier
As low-cost Radio Frequency Identification (RFID) will become pervasive in our daily lives,
RFID systems may create new threats to the security and privacy of individuals and …
RFID systems may create new threats to the security and privacy of individuals and …
[PDF][PDF] LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags
P Peris-Lopez… - Proc. of 2nd …, 2006 - rfidsec2013.iaik.tugraz.at
Low-cost Radio Frequency Identification (RFID) tags are devices of very limited
computational capabilities, where only 250-3K logic gates can be devoted to security-related …
computational capabilities, where only 250-3K logic gates can be devoted to security-related …
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags
Abstract Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as
smart labels are emerging as one of the most pervasive computing technologies in history …
smart labels are emerging as one of the most pervasive computing technologies in history …
EMAP: An efficient mutual-authentication protocol for low-cost RFID tags
RFID tags are devices of very limited computational capabilities, which only have 250-3K
logic gates that can be devoted to security-related tasks. Many proposals have recently …
logic gates that can be devoted to security-related tasks. Many proposals have recently …