2022
DOI: 10.3390/s22093110
|View full text |Cite
|
Sign up to set email alerts
|

RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure

Abstract: The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have a significant impact on our daily lives. While the growing number of linked IoT devices makes our daily lives easier, it also puts our personal data at risk. In IoT applications, Radio Frequency Identification (RFID) helps in the automatic identification of linked devices, and the dataflow of the system forms a symmetry in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…Let E q (u, v) be an EC over the prime field F q , therefore the equation of EC over F q is defined y 2 = x 3 + ux + v mod q where u, v ∈ F q and 4u 3 + 27v 2 mod q ̸ = 0 where u and v are the curves parameters [34], [35].…”
Section: B Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%
“…Let E q (u, v) be an EC over the prime field F q , therefore the equation of EC over F q is defined y 2 = x 3 + ux + v mod q where u, v ∈ F q and 4u 3 + 27v 2 mod q ̸ = 0 where u and v are the curves parameters [34], [35].…”
Section: B Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%
“…All of these rely on the fact that the data from the sensors must be transmitted somehow. This is an especially significant threat to IoT and industrial IoT devices and sensors [ 26 , 27 ]. Even the commonly used IIoT protocol MQTT is prone to typical attacks [ 28 , 29 ], e.g., as considered in this paper, man in the middle attacks [ 30 ].…”
Section: Introductionmentioning
confidence: 99%
“…Wireless sensors are differentiated into active and passive wireless sensors. Applications of passive wireless sensors include passive radar [1][2][3][4][5], liquid sensing [6][7][8], spatial positioning [9][10][11][12][13], RFID [14][15][16][17][18][19][20][21], and blood glucose determination [22,23].…”
Section: Introductionmentioning
confidence: 99%
“…Passive wireless sensors are a core technology in many fields, such as the Internet of Things [24,25], smart cities [26], and smart healthcare [22,23,27]. Many designs in wireless sensing systems utilize a branch coupler for both outputs, which can be used to ensure that the strength of the two signals is equal [20,28,29]. With the evolution of a large number of sensors, a complex environment full of signal scattering interference has been created.…”
Section: Introductionmentioning
confidence: 99%