2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) 2017
DOI: 10.1109/iaeac.2017.8054290
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight RFID authentication protocol with confidentiality and anonymity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 5 publications
0
1
0
Order By: Relevance
“…1. In [1] zhicaishi et.al have presented a protocol which utilizes CRC function not hash function to encrypt all sessions so as to ensure the confidentiality. For each authentication, different random numbers are assured.…”
Section: Confidentialitymentioning
confidence: 99%
“…1. In [1] zhicaishi et.al have presented a protocol which utilizes CRC function not hash function to encrypt all sessions so as to ensure the confidentiality. For each authentication, different random numbers are assured.…”
Section: Confidentialitymentioning
confidence: 99%
“…They run between the tag and card reader, and during their implementation, the parties review the accuracy of each other's identity to accept. Low cost production in RFID tags is one of the most important features (Shi et al, 2017), so there is no possibility of using encryption separately and security of the entire system depends directly on the security level of protocols that are used for identification and authentication.…”
Section: Introductionmentioning
confidence: 99%
“…• Confidentiality: Ensure that information is only available to those who are authorized to access this information (Shi et al, 2017). Confidentiality means that in a secure protocol there shouldn't be any leak-age of information to an attacker or eavesdrop-per.…”
Section: Introductionmentioning
confidence: 99%