Improvements over extended LMAP+: RFID authentication protocol

JB Gurubani, H Thakkar, DR Patel - Trust Management VI: 6th IFIP WG …, 2012 - Springer
Abstract Radio Frequency Identification (RFID) systems are increasingly being deployed in a
variety of applications. Widespread deployment of such contactless systems raises many …

Exploring the RFID mutual authentication domain

SM Mohsin, IA Khan, SM Abrar Akber… - … Journal of Computers …, 2021 - Taylor & Francis
Mutual Authentication is the initial and the most significant line of defense in any open and
trusted network system. Weaknesses in mutual authentication protocol may lead to …

Security analysis of fan et al. lightweight rfid authentication protocol for privacy protection in iot

SF Aghili, H Mala - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Abstract The designers of Radio-Frequency IDentification (RFID) systems have a
challenging task for proposing secure mutual authentication protocols for Internet of Things …

Security analysis of LMAP using AVISPA

S Islam - International journal of security and networks, 2014 - inderscienceonline.com
Radio–frequency identification (RFID) is an RFID tag based technology for providing
automated identification of both objects and humans. RFID tags have numerous potential …

A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards

CL Chen, YC Huang, TF Shih - Information Technology And Control, 2012 - itc.ktu.lt
Radio-frequency identification (RFID) is an automatic identification technology. In recent
years, more and more applications have been found for its use. However, there are still …

Provably lightweight RFID mutual authentication protocol

RHE Alakrut, A Samsudin, A n Syafalni - International Journal of Security …, 2013 - earticle.net
Simplest-Lightweight Authentication Protocol (SLAP) is one of the recent mutual
authentication protocols for lightweight RFID environment. However, server impersonation …

FLMAP: A fast lightweight mutual authentication protocol for RFID systems

A Sadighian, R Jalili - 2008 16th IEEE International Conference …, 2008 - ieeexplore.ieee.org
Numerous authentication protocols for RFID systems were proposed as attempt to prevent
unauthorized tracking and monitoring, impersonation or cloning, and information leakage …

A secure RFID authentication protocol adopting error correction code

CM Chen, SM Chen, X Zheng… - The Scientific World …, 2014 - Wiley Online Library
RFID technology has become popular in many applications; however, most of the RFID
products lack security related functionality due to the hardware limitation of the low‐cost …

Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard

MH Habibi, M Gardeshi - 2011 8th International ISC …, 2011 - ieeexplore.ieee.org
The developing of RFID systems in sensitive applications like e-passport, e-health, credit
cards, and personal devices, makes it necessary to consider the related security and privacy …

Lightweight RFID mutual authentication protocol against feasible problems

Y Jin, H Sun, W Xin, S Luo, Z Chen - Information and Communications …, 2011 - Springer
The wide deployment of RFID systems has raised many concerns about the security and
privacy. Many RFID authentication protocols are proposed for these low-cost RFID tags …