2016
DOI: 10.1002/sec.1488
|View full text |Cite
|
Sign up to set email alerts
|

Efficient identity authentication and encryption technique for high throughput RFID system

Abstract: Radio Frequency Identification (RFID) technology provides a seamless link between physical world and the information system in cyber space. However, the emerging Internet of Things and cloud systems are full of security holes, which introduce new challenging security problems in both tag identification and data privacy. In this paper, we present efficient methods for identity authentication and data encryption to enhance RFID privacy. The proposed techniques aim to ensure no adversary interacting with the tags… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Finally, the ATM machine will receive a matching result and a decision for the user's authentication request. Note that our idea can be extended to support other applications such as remote user authentication using smart cards and RFID identity authentication .…”
Section: Discussionmentioning
confidence: 99%
“…Finally, the ATM machine will receive a matching result and a decision for the user's authentication request. Note that our idea can be extended to support other applications such as remote user authentication using smart cards and RFID identity authentication .…”
Section: Discussionmentioning
confidence: 99%
“…A key management identity authentication (KMIA) protocol for high throughput RFID system was proposed by Hsu et al [25]. This protocol was claimed to be able to achieve secure mutual authentication and data secrecy.…”
Section: Related Workmentioning
confidence: 99%
“…RFID is simplest form of pervasive sensor networks and is commonly used for identification of physical objects [4,5]. Systems based on RFID consist of a tag, which is equipped with a transceiver to send and receive radio signals from connected devices [6,7]. The RFID Reader is the other device which acts as an access point and can receive and send messages to transceivers.…”
Section: Introductionmentioning
confidence: 99%