2014 IEEE RFID Technology and Applications Conference (RFID-TA) 2014
DOI: 10.1109/rfid-ta.2014.6934196
|View full text |Cite
|
Sign up to set email alerts
|

SCARS: Simplified cryptographic algorithm for RFID systems

Abstract: Radio Frequency Identification (RFID) is a technology made popular by the ability of RFID tags to uniquely represent objects. However, they are severely resource-constrained due to design restrictions. This limits their ability to perform complex computations for security. In RFID systems, the priority is to ensure the integrity of messages and entity authentication. We consider message integrity in our work. To ensure message integrity (i.e., the sent message must be the same as the received message), the act… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Especially due to the fact that UHF RFID allows ranges of more than 10 meters, the security of the transmitted data is even more crucial than with near field communication systems. Possible implementations of encryption for RFID have already been shown several times [8,9,10]. The problem with UHF RFID is the low energy available at the passive transponder [11].…”
Section: Introductionmentioning
confidence: 99%
“…Especially due to the fact that UHF RFID allows ranges of more than 10 meters, the security of the transmitted data is even more crucial than with near field communication systems. Possible implementations of encryption for RFID have already been shown several times [8,9,10]. The problem with UHF RFID is the low energy available at the passive transponder [11].…”
Section: Introductionmentioning
confidence: 99%
“…Lately, Radio Frequency Identification (RFID) [1][2][3][4][5][6][7][8][9][10][11][12] has attract a great attention as a new spotlight technology for assisting the computing systems everywhere. In the existing open network situation, RFID recognizes an entity via radio frequency technique which is a type of non-contact automatic identification method.…”
Section: Introductionmentioning
confidence: 99%