2016 IEEE Trustcom/BigDataSE/Ispa 2016
DOI: 10.1109/trustcom.2016.0081
|View full text |Cite
|
Sign up to set email alerts
|

A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels

Abstract: Radio Frequency Identification (RFID) has become a widespread technology to automatically identify objects and with the development of cloud computing, cloud-based RFID systems attract more research these days. Several cloud-based RFID authentication protocols have been proposed to address privacy and security properties in the environment where the cloud provider is untrusted therefore the tag's data are encrypted and anonymously stored in the cloud database. However, most of the cloud-based RFID authenticati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(24 citation statements)
references
References 12 publications
0
24
0
Order By: Relevance
“… Chen and colleagues (2014) proposed a protocol to reduce search time complexity in a database from O (N) to O (logN) and be resistant to desynchronization and tracking attacks. Because of using tree data mechanism in this scheme, the attacker can retrieve the information of all tags by acquiring the information of a number of tags [6].  Lin et al (2015) offered a third-part authentication protocol that is useful for supply chains using cloudbased RFID systems.…”
Section: Table 1 a Review Of The Protocols Presented In The Pastmentioning
confidence: 99%
“… Chen and colleagues (2014) proposed a protocol to reduce search time complexity in a database from O (N) to O (logN) and be resistant to desynchronization and tracking attacks. Because of using tree data mechanism in this scheme, the attacker can retrieve the information of all tags by acquiring the information of a number of tags [6].  Lin et al (2015) offered a third-part authentication protocol that is useful for supply chains using cloudbased RFID systems.…”
Section: Table 1 a Review Of The Protocols Presented In The Pastmentioning
confidence: 99%
“…The cloud server generates a random number r 3 , sends r 1 jjr 3 jjE k (key old jjid T )jjMAC KRC fr 1 jjr 3 jj E k (key old jjid T )g to the reader. 5. R !…”
Section: The Authentication Protocolmentioning
confidence: 99%
“…In 2017, Xiao et al 5 proposed a cloud-based RFID authentication protocol with insecure communication channels; the protocol protects the data transmission between the reader and the cloud server without any help from a third party and preserves tag privacy even when the tag does not update its identification. B Surekha et al 17 proposed a realistic lightweight authentication protocol for securing cloud-based RFID system.…”
Section: The Related Schemesmentioning
confidence: 99%
See 2 more Smart Citations