2018
DOI: 10.3390/s18103584
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Prominent RFID Authentication Protocols for Passive Tags

Abstract: Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 47 publications
0
20
0
Order By: Relevance
“…The low-cost passive RFID tag is small chip designed with limited resources that are only able to perform low computations. Consequently, a literature review was conducted by Baashirah et al [1] to classify the RFID authentication protocols based on the algorithm complexity that the tag has to perform for its responses. This classification includes: heavy-weight, simple-weight, light-weight, and ultra-lightweight.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The low-cost passive RFID tag is small chip designed with limited resources that are only able to perform low computations. Consequently, a literature review was conducted by Baashirah et al [1] to classify the RFID authentication protocols based on the algorithm complexity that the tag has to perform for its responses. This classification includes: heavy-weight, simple-weight, light-weight, and ultra-lightweight.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, RFID technology has been expanding significantly to become essential for daily life matters and integrated with household, automotive, and smartphone applications. A simple RFID system consists of three main components: tags, readers, and servers [1]. The RFID tag is a small chip that works as a transponder to a query signal.…”
Section: Introductionmentioning
confidence: 99%
“…TMIS Protocols Research for generic secure RFID protocols is very active: for instance, a recent survey compares 38 protocols [1]. As for protocols specifically designed for TMIS systems, Masdari et al presented a complete classification in [8], and show that no protocol in the litterature satisfies all the security requirements.…”
Section: Introductionmentioning
confidence: 99%
“…The comprehensive security analysis of the EGP protocol ensures its security claims and robustness against all existing cryptanalysis models. The EPC C1G2 tags are the key component of the low-cost RFID systems due to characteristics like small size, low cost, and unlimited lifespan [20]. Other features of the EPC C1G2 identification system are enumerated as follows [18]: The rest of the paper is organized as follows: Section 2 discusses the Ultralightweight Mutual Authentication Protocols (UMAPs) for the resource constraint RFID systems followed by Section 3 that describes multiple cryptanalysis models used for the security and privacy evaluation of the UMAPs.…”
Section: Introductionmentioning
confidence: 99%