2019
DOI: 10.3390/s19183821
|View full text |Cite
|
Sign up to set email alerts
|

A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems

Abstract: With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures, iris scanners, etc., to infer the environmental status. These devices are generally identified using radio-frequency identification (RFID) to transfer the collected data to other local or remote objects over a geographical location. To enable automat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 56 publications
0
5
0
Order By: Relevance
“…To protect the IoT networks, a lightweight protocol design is playing a crucial role 27 . Of late, various authentication schemes 27–30 have been proposed using identity‐based cryptography that minimizes certificate management for the authentication of IoT devices.…”
Section: Research Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…To protect the IoT networks, a lightweight protocol design is playing a crucial role 27 . Of late, various authentication schemes 27–30 have been proposed using identity‐based cryptography that minimizes certificate management for the authentication of IoT devices.…”
Section: Research Backgroundmentioning
confidence: 99%
“…Zhao et al 15 To protect the IoT networks, a lightweight protocol design is playing a crucial role. 27 Of late, various authentication schemes [27][28][29][30] have been proposed using identity-based cryptography that minimizes certificate management for the authentication of IoT devices. In addition, limited numbers of authentication protocols have been presented for IoT-based mobile computing devices such as mobile healthcare, pay-TV, and wireless body area networks.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, an eavesdropper can forge and access the user's private data. David et al in [21] proposed a hash-based RFID authentication mechanism for Context-Aware Sensor Management System (CASMS) to provide security to prevent attacks such as replay, man-in-the-middle, and desynchronization. Hash-based RFID authentication is the five-phase mechanism, namely pre-phase registration, reader pro-tag request and response, tag mutual session key authentication, back end server key authentication, and session key updating.…”
Section: A Brief Review Of Articles Of This Special Issuementioning
confidence: 99%
“…At the same time, the decentralization, tamper-proof, traceability and trust of the blockchain make this technology very suitable for solving the problems of centralized management and multi-party trust commonly faced by the current RFID anti-counterfeiting traceability system [16]- [18] . However, neither personal research nor the blockchain platform can ensure the authenticity of the traceability data before it is put on the chain, and when the amount of traceability data is large, the operation efficiency of the traceability system cannot be guaranteed [19]- [21] .…”
Section: Introductionmentioning
confidence: 99%