2016
DOI: 10.1007/s11227-016-1861-1
|View full text |Cite
|
Sign up to set email alerts
|

A secure ECC-based RFID mutual authentication protocol for internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(42 citation statements)
references
References 7 publications
0
42
0
Order By: Relevance
“…Finally, they improved these two schemes. A new radio-frequency identification authentication protocol based on elliptic curve cryptography to eliminate these vulnerabilities has been introduced in [18]. The protocol achieves a set of security properties as mutual authentication, anonymity, confidentiality, forward security, location privacy, resistance of man-in-the-middle attack, resistance of replay attack and resistance of impersonation attack.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, they improved these two schemes. A new radio-frequency identification authentication protocol based on elliptic curve cryptography to eliminate these vulnerabilities has been introduced in [18]. The protocol achieves a set of security properties as mutual authentication, anonymity, confidentiality, forward security, location privacy, resistance of man-in-the-middle attack, resistance of replay attack and resistance of impersonation attack.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed solution preserves security and computational costs less than the previous methods. Furthermore, key management solutions are presented for dynamic access problems in RFID cards in order to be able to develop scalability healthcare networks Various research and articles have been conducted for RFID security in a variety of applications, which, in addition to providing effective security schemes, identify and discuss the following security issues [3,7,10,16,18,[25][26][27][28][31][32][33][34][35][36][37][38][39]:…”
Section: Methods and Related Workmentioning
confidence: 99%
“…Topic 6 corresponds to research on the development of user mutual authentication protocols for social IoT, IoTbased Long-Term Evolution (LTE), LTE-advanced networks, WSNs, and NFC (near-field communication) payment systems [144,[208][209][210][211][212][213][214][215][216][217][218]. In addition, the verification of authentication protocols using software tools, such as BAN and AVISPA, has gained popularity [213,214,217,[219][220][221]. Recently, the target of authentication has gained attention for mobile smart objects, such as drones and vehicles [219,221,222].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%