“…Over the past few years, some interesting anonymous RFID authentication protocols have been proposed [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22], where we can divide them into public key cryptosystem (PKC) and non-public key crypto system (NPKC) based schemes. Among PKC based RFID systems [5][6][7][8][9][10], most of them are based on so called elliptic curve crypto system (ECC) based algorithms.…”
“…Over the past few years, some interesting anonymous RFID authentication protocols have been proposed [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22], where we can divide them into public key cryptosystem (PKC) and non-public key crypto system (NPKC) based schemes. Among PKC based RFID systems [5][6][7][8][9][10], most of them are based on so called elliptic curve crypto system (ECC) based algorithms.…”
“…As shown in figure 9, the only difference is that in this protocol there is an additional E value to add more security in database authentication compare to LMAP method [26]. Though it is efficient in that it uses some calculations for authentication, [28] confirm that it fails to provide strong integrity since it does not use hash formulas or encryption algorithms. Therefore, there is a possibility to track user location when the final session is concluded irregularly and also the IDS and key values are not refreshed.…”
Section: Irfan Syamsuddin State Of the Art On Secure And Low Cost Rfmentioning
confidence: 99%
“…In reality, connection between the RFID reader and the central database do not always available thus fully relying on a central database means creating a single point of failure, opening up the entire RFID system to denial of service attacks [28].…”
Section: H Mutual Authenticationmentioning
confidence: 99%
“…This method is more effective than the two previously mentioned systems, and can provide security within close ranges. However, it can be exposed to 3rd party tapping, message fabrication, or forgery over long ranges [28].…”
Section: Irfan Syamsuddin State Of the Art On Secure And Low Cost Rfmentioning
confidence: 99%
“…Authentication protocols as presented in [10,11,28], Ultra Lightweight method which was introduced by Peris-Lopez . [24,26,27].…”
Section: Low Cost Rfid Authentication Protocolsmentioning
Index terms: RFID, vehicle plate license, smart identification, security and privacy, low cost, data protection, tracking prevention, and forward security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.