DOI: 10.1007/978-3-540-75476-3_50
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Low-Cost RFID System Management with Mutual Authentication Scheme in Ubiquitous

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 6 publications
0
13
0
Order By: Relevance
“…Over the past few years, some interesting anonymous RFID authentication protocols have been proposed [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22], where we can divide them into public key cryptosystem (PKC) and non-public key crypto system (NPKC) based schemes. Among PKC based RFID systems [5][6][7][8][9][10], most of them are based on so called elliptic curve crypto system (ECC) based algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Over the past few years, some interesting anonymous RFID authentication protocols have been proposed [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22], where we can divide them into public key cryptosystem (PKC) and non-public key crypto system (NPKC) based schemes. Among PKC based RFID systems [5][6][7][8][9][10], most of them are based on so called elliptic curve crypto system (ECC) based algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…As shown in figure 9, the only difference is that in this protocol there is an additional E value to add more security in database authentication compare to LMAP method [26]. Though it is efficient in that it uses some calculations for authentication, [28] confirm that it fails to provide strong integrity since it does not use hash formulas or encryption algorithms. Therefore, there is a possibility to track user location when the final session is concluded irregularly and also the IDS and key values are not refreshed.…”
Section: Irfan Syamsuddin State Of the Art On Secure And Low Cost Rfmentioning
confidence: 99%
“…In reality, connection between the RFID reader and the central database do not always available thus fully relying on a central database means creating a single point of failure, opening up the entire RFID system to denial of service attacks [28].…”
Section: H Mutual Authenticationmentioning
confidence: 99%
See 2 more Smart Citations