SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT

SF Aghili, H Mala, P Kaliyar, M Conti - Future Generation Computer …, 2019 - Elsevier
The safety of medical data and equipment plays a vital role in today's world of Medical
Internet of Things (MIoT). These IoT devices have many constraints (eg, memory size …

A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications

F Wu, L Xu, S Kumari, X Li, AK Das, J Shen - Journal of Ambient …, 2018 - Springer
As an important part of Internet of Things, Radio Frequency Identification (RFID) system
employs low-cost RFID tag to communicate with everything containing animate and …

A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS

FM Salem, R Amin - Information sciences, 2020 - Elsevier
The healthcare environment now provides the facility for patients to communicate with
doctors from home via the Internet; this facility is very useful for seriously ill patients. Errors in …

Closed-loop and open-loop authentication protocols for blockchain-based IoT systems

SF Aghili, H Mala, C Schindelhauer, M Shojafar… - Information processing & …, 2021 - Elsevier
Designers of smart environments based on radio frequency identification devices have a
challenging task to build secure mutual authentication protocols. These systems are …

Study on the anti-theft technology of museum cultural relics based on Internet of Things

Z Liu, M Wang, S Qi, C Yang - IEEE Access, 2019 - ieeexplore.ieee.org
With the advancement of society, the museum has exhibited more and more cultural relics,
the number of visitors has also increased rapidly, and more and more criminals have stolen …

Dual cooperative RFID‐telecare medicine information system authentication protocol for healthcare environments

M Benssalah, M Djeddou… - Security and …, 2016 - Wiley Online Library
Abstract Radio Frequency IDentification (RFID) technology is used in a wide variety of
applications, more recently as a leading identification technology in healthcare …

Radio frequency identification and mobile ad-hoc network: Theories and applications

K Kasemsap - Handbook of research on recent developments in …, 2017 - igi-global.com
This chapter explains the components of Radio Frequency Identification (RFID); the aspects
of RFID; the barriers to RFID utilization; the privacy and security issues of RFID; the RFID …

Security analysis of fan et al. lightweight rfid authentication protocol for privacy protection in iot

SF Aghili, H Mala - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Abstract The designers of Radio-Frequency IDentification (RFID) systems have a
challenging task for proposing secure mutual authentication protocols for Internet of Things …

Review of the medical Internet of Things-based RFID security protocols

N Telagam, N Kandasamy - Nanoelectronic Devices for Hardware …, 2021 - taylorfrancis.com
The security for medical data of patients plays a critical role in the medical field-based IoT.
Recently, researchers have proposed RFID-based authentication protocols for medical …

HEADA: a low cost RFID authentication technique using homomorphic encryption for key generation

M Dawoud, DT Altilar - Security and Communication Networks, 2016 - Wiley Online Library
The limited computational and memory resources available in the Radio Frequency
Identification (RFID) tags constitute the essential challenge to find a technique that satisfies …