2016
DOI: 10.1002/sec.1718
|View full text |Cite
|
Sign up to set email alerts
|

An authenticated encryption based grouping proof protocol for RFID systems

Abstract: Radio frequency identification grouping proof authentication protocol is an approach to identify a set of tagged objects simultaneously. Over the past decade, several protocols in this domain have been presented, but each was weak with flawed attributes. It is essential that a grouping proof protocol be both scalable and affordable, considering its use for applications with large quantities of tags and the high level of security. In this paper, we present a secure and scalable grouping proof protocol by utiliz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Rostampour et al [24] focused on the simultaneous identification of a set of objects tagged using RFID technology, an approach named RFID grouping proof authentication protocol. Using a method called authenticated encryption, they created a new authentication method that is scalable and secure.…”
Section: Related Workmentioning
confidence: 99%
“…Rostampour et al [24] focused on the simultaneous identification of a set of objects tagged using RFID technology, an approach named RFID grouping proof authentication protocol. Using a method called authenticated encryption, they created a new authentication method that is scalable and secure.…”
Section: Related Workmentioning
confidence: 99%
“…In the same year, Burmester and Munilla [9] extended earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers. Rostampour et al [10] adopted authenticated encryption to design a scalable grouping proof protocol with message authentication code, which provides both confidentiality and message integrity simultaneously. Each tag individually computes authenticated message, and the reader is responsible for gathering the response messages of all tags in the authentication phase.…”
Section: Introductionmentioning
confidence: 99%