The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1109/tmc.2015.2412933
|View full text |Cite
|
Sign up to set email alerts
|

EPC Gen2v2 RFID Standard Authentication and Ownership Management Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
19
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 40 publications
0
19
0
Order By: Relevance
“…The number of times (x) a object is authenticated in a zone accounts for a total of x *(4T XOR +4T PRNG +1T EDC +2T RNG ). Performance Analysis of MKT phase (mutual authentication, key update and ticket computation) in [1] is analyzed for the time complexity of the operations (TXOR-time complexity of the XOR operation, TRNG -time complexity of the random number generation operation, TPRNG-time complexity of Pseudo Random number function, TPER-time complexity of permutation operation, T MOD -time complexity of modulus operation) used in mutual authentication. Table 5 projects the total time complexity at a tag identifying the object and a reader (authenticator).…”
Section: Desynchronization Attackmentioning
confidence: 99%
See 4 more Smart Citations
“…The number of times (x) a object is authenticated in a zone accounts for a total of x *(4T XOR +4T PRNG +1T EDC +2T RNG ). Performance Analysis of MKT phase (mutual authentication, key update and ticket computation) in [1] is analyzed for the time complexity of the operations (TXOR-time complexity of the XOR operation, TRNG -time complexity of the random number generation operation, TPRNG-time complexity of Pseudo Random number function, TPER-time complexity of permutation operation, T MOD -time complexity of modulus operation) used in mutual authentication. Table 5 projects the total time complexity at a tag identifying the object and a reader (authenticator).…”
Section: Desynchronization Attackmentioning
confidence: 99%
“…Reliable security solutions for RF applications demand security requirements with respect to authentication, integrity, privacy, anonymity, session freshness, synchronization. Interesting threads of research in this direction have been the focus of [1]- [6]. As RF systems are chiefly low-powered, it is important that the security solutions take into consideration computing over heads.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations