Blockchain-based authentication for IIoT devices with PUF

D Li, R Chen, D Liu, Y Song, Y Ren, Z Guan… - Journal of Systems …, 2022 - Elsevier
With the continuous development of edge computing and IIoT technology, there are growing
types of IIoT devices, and the number of such devices is continuously climbing. It is …

ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grou**-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment

S Majumder, S Ray, D Sadhukhan… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) promotes the fundamental tracking procedure of the
Internet of Things (IoT) network due to its autonomous data collection as well as transfer …

Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grou** proofs

L Batina, YK Lee, S Seys, D Singelée… - Personal and Ubiquitous …, 2012 - Springer
Since the introduction of the concept of grou** proofs by Juels, which permit RFID tags to
generate evidence that they have been scanned simultaneously, various new schemes …

[PDF][PDF] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography.

Y Liu, X Qin, C Wang, B Li - J. Comput., 2013 - jcomputers.us
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency
Identification (RFID) system development further. In this paper, we propose a robust …

ECC-based grou**-proof RFID for inpatient medication safety

Q Lin, F Zhang - Journal of Medical Systems, 2012 - Springer
Several papers were proposed in which symmetric cryptography was used to design RFID
grou**-proof for medication safety in the Journal of Medical Systems. However, if we want …

Adding features of educational games for teaching Physics

K Muñoz, J Noguez, P Mc Kevitt, L Neri… - 2009 39th IEEE …, 2009 - ieeexplore.ieee.org
Virtual laboratories (VLs) have to overcome important challenges to improve student
knowledge, understanding and motivation. This research aims to test the hypothesis that …

Modifying the ECC-based grou**-proof RFID system to increase inpatient medication safety

WT Ko, SY Chiou, EH Lu, HKC Chang - Journal of medical systems, 2014 - Springer
RFID technology is increasingly used in applications that require tracking, identification, and
authentication. It attaches RFID-readable tags to objects for identification and execution of …

Cryptanalysis and improvement of a group RFID authentication protocol

N Pakniat, Z Eslami - Wireless Networks, 2020 - Springer
In recent years, radio frequency identification (RFID) systems have become popular for
identification. The key technology to protect the security of RFID systems is mutual …

The Lightweight RFID Grou**‐Proof Protocols with Identity Authentication and Forward Security

Z Shi, X Zhang, J Liu - Wireless Communications and Mobile …, 2020 - Wiley Online Library
In many fields, multiple RFID tags are often combined into a group to identify an object. An
RFID grou**‐proof protocol is utilized to prove the simultaneous existence of a group of …

A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function

A Al-Adhami, M Ambroze, I Stengel… - … on Ubiquitous and …, 2017 - ieeexplore.ieee.org
The applications of using multi-tag RFID technology have rapidly grown to be used in
different fields of life. However, security and privacy are the main issues with this technology …