2017
DOI: 10.1007/s11227-017-2105-8
|View full text |Cite
|
Sign up to set email alerts
|

On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 114 publications
(36 citation statements)
references
References 10 publications
0
36
0
Order By: Relevance
“…Moreover, XMPP and AMQP can also use the Simple Authentication and Security Layer (SASL) protocol to authenticate devices [42,43]. However, for all these protocols and the existing works related to the IoT field [37,31,63,62] is recommendable to verify the suitability of the approach taking into account the technical restrictions of the IIoT devices together with control requirements as specified in [7].…”
Section: Mpdp-fog: Modules and Functionalitymentioning
confidence: 99%
“…Moreover, XMPP and AMQP can also use the Simple Authentication and Security Layer (SASL) protocol to authenticate devices [42,43]. However, for all these protocols and the existing works related to the IoT field [37,31,63,62] is recommendable to verify the suitability of the approach taking into account the technical restrictions of the IIoT devices together with control requirements as specified in [7].…”
Section: Mpdp-fog: Modules and Functionalitymentioning
confidence: 99%
“…Tewari and Gupta in [14], following the method used by previous protocols, proposed another rotation based protocol. This time, the reports such as [21,22] were released on the vulnerability of this protocol against various attacks. Another example is ULRMAPC protocol [15] which [23] proved its vulnerability against DoS, impersonation and de-synchronization attacks.…”
Section: Related Workmentioning
confidence: 99%
“…However, as it is shown in Table 4, it costs to implement an encryption/decryption function, although this is a cost we should pay to achieve a promising security. × [18,30] × [19] × [18,30] × [16] Gossamer [13] × [20] × [20] × [20] ULRMAPC [15] × [23] × [23] × [23] Tewari and Gupta [14] × [21,22] × [21,22] × [21,22] × [21,22] ULRAS [24] ×(in this paper, [25] ) × [25] ×(in this paper) Aghili and Mala [25] ×(in this paper) ×(in this paper) ×(in this paper) ×(in this paper) UEAP Table 4. Computational cost comparison of the UEAP protocol with other protocols, where L denotes the length of each parameter in protocols…”
Section: Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to a few reasons, we should not use generic authentication key agreement protocols [5] or lightweight protocols for the general purpose short distance communications [6] in WBANs. Firstly, the specific architecture of the WBAN includes three tiers with multiple first level nodes whose most generic protocols are not optimized in this setting.…”
Section: Introductionmentioning
confidence: 99%