2019
DOI: 10.1155/2019/3295616
|View full text |Cite
|
Sign up to set email alerts
|

Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags

Abstract: The field of pervasive computing especially the Internet of Things (IoT) network is evolving due to high network speed and increased capacity offered by the 5G communication system. The IoT network identifies each device before giving it access to the network. The RFID system is one of the most prominent enabling technologies for the node identification. Since the communication between the node and the network takes place over an insecure wireless channel, an authentication mechanism is required to avoid the m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 44 publications
(40 reference statements)
0
10
0
Order By: Relevance
“…Hence, depending on the target application, some designers have tried to design their protocol using only bit-wise operations and bit-wise permutation functions, e.g. [11], [3], [26], [27], and some other tried to use more sound components such as hash functions, e.g. [28], Physically Unclonable Functions (PUF), e.g.…”
Section: B State Of the Artmentioning
confidence: 99%
“…Hence, depending on the target application, some designers have tried to design their protocol using only bit-wise operations and bit-wise permutation functions, e.g. [11], [3], [26], [27], and some other tried to use more sound components such as hash functions, e.g. [28], Physically Unclonable Functions (PUF), e.g.…”
Section: B State Of the Artmentioning
confidence: 99%
“…Basically RFID system is a low-cost design with limited memory and power and capable to support wireless communication. Therefore, it is essential to introduce low-cost module cryptographic algorithm for privacy and security for the device [31].…”
Section: Design and Implementation Of Rfid Authentication Protocol Bamentioning
confidence: 99%
“…The performance comparison of the EGP protocol shows that it outperforms compared to its contending UMAPs in terms of security. This remarkable feature makes EGP the best choice for extremely low-cost IoTs sensors and RFID tags [31].…”
Section: Madiha Khalid Umar Mujahid Najam-ul-islammentioning
confidence: 99%
See 1 more Smart Citation
“…Radiofrequency identification (RFID) [24] technology has gained a lot of attention in recent years. RFID is an automatic system that stores/retrieves data in/from devices called RFID tags.…”
Section: Rfid Technologymentioning
confidence: 99%