2018
DOI: 10.1016/j.future.2017.06.023
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
84
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 148 publications
(84 citation statements)
references
References 26 publications
0
84
0
Order By: Relevance
“…In general, current logistics schemes lack face to face package checking procedures and rely on buyers to ensure that packages are intact upon receipt. In addition, the security issues of RFID systems are not completely suitable for the scheme proposed in this study [8]. Instead, this study uses ECC (elliptic curve cryptography) to generate session keys that are used to secure data transmissions and the BAN logic model [9] to prove the correctness of the proposed scheme with mutual authentication.…”
Section: Related Workmentioning
confidence: 99%
“…In general, current logistics schemes lack face to face package checking procedures and rely on buyers to ensure that packages are intact upon receipt. In addition, the security issues of RFID systems are not completely suitable for the scheme proposed in this study [8]. Instead, this study uses ECC (elliptic curve cryptography) to generate session keys that are used to secure data transmissions and the BAN logic model [9] to prove the correctness of the proposed scheme with mutual authentication.…”
Section: Related Workmentioning
confidence: 99%
“…This collision challenge is known as tag-collision, as well as the resolution procedures are named anti-collision algorithms. 3,4 The tags categorized into the passive and active types. The tag in passive type is free of built-in button battery to support their communication operations.…”
Section: Introductionmentioning
confidence: 99%
“…Authentication is one of the security approaches to safeguard systems. From the literature [26], [27] and [28], it understood that most of the RFID critical applications followed RFID based authentication for security. Considering the case study such as SMART HOME in this paper, we investigated further and came to know different scenarios that may occur in access control mechanism of this use case.…”
Section: Introductionmentioning
confidence: 99%