The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2009 Third International Conference on Emerging Security Information, Systems and Technologies 2009
DOI: 10.1109/securware.2009.12
|View full text |Cite
|
Sign up to set email alerts
|

AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems

Abstract: In this paper we propose two mutual authentication protocols for RFID systems. Generally, in RFID systems, a reader can authenticate tags in the real-time and batch modes. This paper proposes the first authentication protocol for the real-time mode. It also proposes an efficient robust mutual authentication protocol for the batch mode. Some significant characteristics of the protocols are forward security, tag anonymity, location privacy, low complexity on the backend server, and scalability. To the best of ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…For this, fingerprinting technology can be adopted 60 . RFID security protocols like RWP, 61 AFMAP, 62 and RFID private authentication protocols 63 have been developed. Digital signature technology can also be implemented to ensure data integrity as well as node authentication 21 …”
Section: Analysis Of Some Technology Based Issues In Iot and Existingmentioning
confidence: 99%
“…For this, fingerprinting technology can be adopted 60 . RFID security protocols like RWP, 61 AFMAP, 62 and RFID private authentication protocols 63 have been developed. Digital signature technology can also be implemented to ensure data integrity as well as node authentication 21 …”
Section: Analysis Of Some Technology Based Issues In Iot and Existingmentioning
confidence: 99%
“…After a set of authentication sessions, the list of pseudonyms will need to be reused or updated through an out-of-band channel, which limits the practicality of this scheme. In addition to this there are other lightweight mutual authentication protocols proposed in the literature [4][5][6]. Attacks have been successfully mounted on all of these as demonstrated in literature [7][8][9].…”
Section: Related Workmentioning
confidence: 99%
“…This is indeed noticeable throughout the literature on RFID [1,2]. Furthermore, within RFID system structure context, many lightweight RFID authentication protocols [3][4][5] and grouping proof protocols [6][7][8] are proposed to be implemented over the practically required secure RFID channels. Recently, the grouping proof protocol is adopted to improve patient safety.…”
Section: Introductionmentioning
confidence: 99%