2014
DOI: 10.1007/s11276-014-0803-1
|View full text |Cite
|
Sign up to set email alerts
|

Low-cost authentication protocol for passive, computation capable RFID tags

Abstract: Authentication of products and humans is one of the major future applications of Radio Frequency IDentification (RFID) technology. None of the recent RFID technology related authentication approaches has been fully convincing. Either these schemes offer a low-level of security or they are vulnerable to Denial-of-Service attacks that keep the authentication system from proper functioning. Some schemes raise privacy and security concerns as they reveal confidential information about the RFID tag bearer and allow… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…The Zhu et al [17] continue the same work of Khan [16] with minor changes in authentication protocol with key updation improvements. Khan et al [18] present the low-cost RFID authentication protocol for performance improvements. The work is compared with yet-another Trivial Authentication protocol with improvements in the computational effort and implemented in real-time environments.…”
Section: Introductionmentioning
confidence: 99%
“…The Zhu et al [17] continue the same work of Khan [16] with minor changes in authentication protocol with key updation improvements. Khan et al [18] present the low-cost RFID authentication protocol for performance improvements. The work is compared with yet-another Trivial Authentication protocol with improvements in the computational effort and implemented in real-time environments.…”
Section: Introductionmentioning
confidence: 99%