2015
DOI: 10.1016/j.cose.2015.05.004
|View full text |Cite
|
Sign up to set email alerts
|

A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
65
0
1

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 72 publications
(76 citation statements)
references
References 20 publications
0
65
0
1
Order By: Relevance
“…If a group of sensor nodes share the same key and use it for authentication, then it is vulnerable to cloning attacks [27]. In our proposed scheme, each sensor node owns its unique secret credentials { , ( ), }.…”
Section: F Resistance To Cloning Attacksmentioning
confidence: 99%
“…If a group of sensor nodes share the same key and use it for authentication, then it is vulnerable to cloning attacks [27]. In our proposed scheme, each sensor node owns its unique secret credentials { , ( ), }.…”
Section: F Resistance To Cloning Attacksmentioning
confidence: 99%
“…The details of the performance comparison based on computational overhead and execution times are shown in Figures and , respectively. Conclusively, based on the aforesaid outcomes, it can be argued that our proposed scheme can be useful in many real‐time applications like GLOMONET , WSN , and RFID system .…”
Section: Comparison With Other Ae Modesmentioning
confidence: 65%
“…Now, we can also apply our proposed concept of stream Authenticated Encryption s for ensuring both the privacy and integrity aware data communication in the GLOMONET , WSN , radio‐frequency identification , and authenticated cloud computing environment . In this case, our objective is to reduce the computational cost during the data communication process.…”
Section: Applicationsmentioning
confidence: 99%
“…Besides, because the PFC-CTR is also based on counter mode, accordingly, the system employ PFC-CTR is also resilient to replay attacks, like SNEP [26] and ZigBee [27]. Now, we can also apply our proposed concept of stream Authenticated Encryption s for ensuring both the privacy and integrity aware data communication in the GLOMONET [30][31][32][33], WSN [34], radio-frequency identification [35], and authenticated cloud computing environment [36]. In this case, our objective is to reduce the computational cost during the data communication process.…”
mentioning
confidence: 99%