2019
DOI: 10.3390/electronics8101166
|View full text |Cite
|
Sign up to set email alerts
|

SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography

Abstract: Internet of Things (IoT) is a new paradigm that has been evolving into the wireless sensor networks to expand the scope of networked devices (or things). This evolution drives communication engineers to design secure and reliable communication at a low cost for many network applications such as radio frequency identification (RFID). In the RFID system, servers, readers, and tags communicate wirelessly. Therefore, mutual authentication is necessary to ensure secure communication. Normally, a central server supp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 20 publications
(23 reference statements)
0
4
0
Order By: Relevance
“…In addition, Benssalah requires a total of six hash functions and four scalar multiplications in one round. Baashira indicated in his paper [ 118 ] that the use of cryptographic hash functions increases the level of protocol security but at the same time requires more computing capacity, which must be taken into account for applications with constrained resources. The number of scalar multiplication operations has an impact on the computational cost of an RFID communication.…”
Section: Comparative Study Of Ecc-based Authentication Protocols: Implementation Cost and Vulnerabilitymentioning
confidence: 99%
“…In addition, Benssalah requires a total of six hash functions and four scalar multiplications in one round. Baashira indicated in his paper [ 118 ] that the use of cryptographic hash functions increases the level of protocol security but at the same time requires more computing capacity, which must be taken into account for applications with constrained resources. The number of scalar multiplication operations has an impact on the computational cost of an RFID communication.…”
Section: Comparative Study Of Ecc-based Authentication Protocols: Implementation Cost and Vulnerabilitymentioning
confidence: 99%
“…This section reviews the baseline protocol of Baashirah and Abuzneid proposed in the work"SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography" (Baashirah, 2019) and describes its vulnerabilities. Table 2 introduces the notations used in the SLEC protocol.…”
Section: The Baseline Protocol Descriptionmentioning
confidence: 99%
“…In order to protect RFID systems from more attacks, in 2019, Baashirah and Abuzneid proposed a serverless RFID authentication protocol (Baashirah, 2019) This paper is divided as follows, then Section 2 describes the methodology and results of the bibliographic research about this topic. In section 3, the SLEC protocol is described and Section 4 its vulnerabilities and problems are pointed out.…”
Section: Introductionmentioning
confidence: 99%
“…This method aims to perform the safety measures of patient with wireless sensor network and encrypting the data. IoT security provides strengthened to the investigators and to provide the keys to optimal imperialist to develop a competitive, several techniques are enhanced [19].…”
Section: Introductionmentioning
confidence: 99%