The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2008 16th IEEE International Conference on Networks 2008
DOI: 10.1109/icon.2008.4772592
|View full text |Cite
|
Sign up to set email alerts
|

FLMAP: A fast lightweight mutual authentication protocol for RFID systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…After a set of authentication sessions, the list of pseudonyms will need to be reused or updated through an out-of-band channel, which limits the practicality of this scheme. In addition to this there are other lightweight mutual authentication protocols proposed in the literature [4][5][6]. Attacks have been successfully mounted on all of these as demonstrated in literature [7][8][9].…”
Section: Related Workmentioning
confidence: 99%
“…After a set of authentication sessions, the list of pseudonyms will need to be reused or updated through an out-of-band channel, which limits the practicality of this scheme. In addition to this there are other lightweight mutual authentication protocols proposed in the literature [4][5][6]. Attacks have been successfully mounted on all of these as demonstrated in literature [7][8][9].…”
Section: Related Workmentioning
confidence: 99%
“…Hence, in whole of this paper we do not distinguish between the reader and the back-end database of FLMAP. To describe the FLMAP, we follow the notations used by the designers of FLMAP [10] which are as follows: and authenticates the tag if y y ′ = .…”
Section: Preliminariesmentioning
confidence: 99%
“…Many mutual authentication protocols are proposed so that tags and readers can securely authenticate each other. So far, several lightweight mutual authentication protocols have been claimed suitable to be employed in RFID applications [3,7,8,10]. However, most of these protocols have failed to achieve the required security goals [1,2,4,5,6,9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation