Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc. These protocols should resist active and passive …
Radio frequency identification systems need secure protocols to provide confidentiality, privacy protection, mutual authentication, etc. These protocols should resist active and …
M Azizi, N Bagheri - International Journal of UbiComp, 2011 - search.proquest.com
Recently, Kianersi et al. have proposed an ultra-lightweight mutual authentication protocol for low-cost RFID tags, entitled SULMA. They have claimed that the SULMA protocol is …
H Fernando, J Abawajy - … Networking, and Services: 7th International ICST …, 2012 - Springer
Out of the large number of RFID security protocols proposed in recent years none have proven to be truly secure and the creation of a truly secure security protocol for systems …
In order to secure RFID systems as much as possible, most solutions do not only require tags to authenticate themselves to readers, but they also require readers to authenticate …
Y Yang, J Gu, C Lv, Q Jiang, W Ma - IET Information Security, 2012 - IET
The authors describe three attacks against an efficient lightweight mutual authentication protocol recently proposed by Kulseng et al. These attacks are unique as they are closely …
In this paper, we analyse the security of two mutual authentication protocols that have been recently proposed by Gao et al.(IEEE Access, 7: 8376-8384, 2019), a hash-based protocol …
MH Habibi, M Gardeshi - 2011 8th International ISC …, 2011 - ieeexplore.ieee.org
The developing of RFID systems in sensitive applications like e-passport, e-health, credit cards, and personal devices, makes it necessary to consider the related security and privacy …
RFID tags are devices of very limited computational capabilities, which only have 250-3K logic gates that can be devoted to security-related tasks. Many proposals have recently …