2019
DOI: 10.1016/j.future.2018.07.004
|View full text |Cite
|
Sign up to set email alerts
|

Double verification protocol via secret sharing for low-cost RFID tags

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 40 publications
(38 reference statements)
0
6
0
Order By: Relevance
“…A Dos attack can successfully implement within a certain probability range for the UAPP protocol with a bit-tampering asynchronous attack method has been reported in [15]. An ultralightweight mutual-authentication protocol UMAPSS based on secret sharing has been introduced in [16], which includes mechanisms for double verification, session control, mutual authentication, and dynamic update to enhance security and provide a robust privacy protection. In 2018, Rad et al [17] gave an attack method for the distance-bounding protocols MP and KA, and proved that these protocols are vulnerable against terrorist fraud attack and force attack.…”
Section: Related Workmentioning
confidence: 99%
“…A Dos attack can successfully implement within a certain probability range for the UAPP protocol with a bit-tampering asynchronous attack method has been reported in [15]. An ultralightweight mutual-authentication protocol UMAPSS based on secret sharing has been introduced in [16], which includes mechanisms for double verification, session control, mutual authentication, and dynamic update to enhance security and provide a robust privacy protection. In 2018, Rad et al [17] gave an attack method for the distance-bounding protocols MP and KA, and proved that these protocols are vulnerable against terrorist fraud attack and force attack.…”
Section: Related Workmentioning
confidence: 99%
“…To highlight the proposal security performances, we have compared it to some previous related works in the field. Table summarizes the performance evaluation and some comparisons between recent works based on Reference . The comparison shows the superiority of the proposed approach to the previous works.…”
Section: Resultsmentioning
confidence: 98%
“…Most of the proposed authentication protocols can be categorized as ultralightweight, lightweight, or non-lightweight protocols from a high-level perspective regarding the components used. The foundation of ultralightweight protocols is bit-level operations such as Exclusive-or (XOR), Rotation, AND, and OR, for instance, SASI [4], RAPP [5], R 2 AP [6], RCIA [7], KMAP [8], SLAP [9], SecLAP [10], Eghdamian and Samsudin's protocol [11], David-Prasad ultralightweight authentication protocol [12], and UMAPSS [13]. However, due to a lack of sufficient confusion and diffusion, nearly all protocols in this class have been severely degraded up to this point [14][15][16][17][18][19][20][21].…”
Section: Related Workmentioning
confidence: 99%