2017
DOI: 10.1007/s11276-017-1565-3
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and secure RFID authentication protocol using elliptic curve cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 59 publications
(70 citation statements)
references
References 27 publications
0
67
0
Order By: Relevance
“…Knospe and Pohl [7] have mentioned confidentiality, availability, authenticity, integrity, and anonymity are the necessary security properties of an RFID system. Dinarvand and Barati [8] figured out that the two additional security features which must also be implemented in the RFID system are forward secrecy and scalability. Therefore, the necessary security requirements of an RFID system are data confidentiality, mutual authentication, data integrity, non-repudiation, availability, tag anonymity, forward secrecy, and scalability.…”
Section: Rfid Security Requirementsmentioning
confidence: 99%
See 4 more Smart Citations
“…Knospe and Pohl [7] have mentioned confidentiality, availability, authenticity, integrity, and anonymity are the necessary security properties of an RFID system. Dinarvand and Barati [8] figured out that the two additional security features which must also be implemented in the RFID system are forward secrecy and scalability. Therefore, the necessary security requirements of an RFID system are data confidentiality, mutual authentication, data integrity, non-repudiation, availability, tag anonymity, forward secrecy, and scalability.…”
Section: Rfid Security Requirementsmentioning
confidence: 99%
“…They also proposed a security scheme for RFID which provided many security features but it fails to satisfy mutual authentication, scalability, and resistance against de-synchronization attack. Dinarvand and Barati [8] presented an elliptic curve based mutual authentication protocol which offers many security features including mutual authentication, confidentiality, forward security, scalability, anonymity, availability, and integrity. They also proved that the protocol can defend against cloning, replay, de-synchronization, location tracking, masquerade, modification, and server spoofing attacks.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations