IoT based smart rationing system

RS Krishnan, A Sangeetha, A Kumar… - … and virtual mobile …, 2021 - ieeexplore.ieee.org
In developing countries like India, the poor people meet their fundamental needs through
subsidy provided by the government for basic domestic commodities. The prevailing public …

Security enhanced RFID authentication protocols for healthcare environment

S Xie, F Zhang, R Cheng - Wireless Personal Communications, 2021 - Springer
RFID technology, which is concerned as one of the core technologies of Internet of Things,
has been widely deployed in healthcare environment and brings a lot of convenience for …

Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol

MA Khan, S Ullah, T Ahmad, K Jawad, A Buriro - Sensors, 2023 - mdpi.com
Exploiting Radio Frequency Identification (RFID) technology in healthcare systems has
become a common practice, as it ensures better patient care and safety. However, these …

Secure improved cloud-based RFID authentication protocol

S Abughazalah, K Markantonakis, K Mayes - International Workshop on …, 2014 - Springer
Abstract Although Radio Frequency IDentification (RFID) systems promise a fruitful future,
security and privacy concerns have affected the adoption of the RFID technology. Several …

A cloud-based authentication protocol for RFID supply chain systems

IC Lin, HH Hsu, CY Cheng - Journal of Network and Systems Management, 2015 - Springer
RFID technology is the popular technology in recent years and applies to many automatic
identification applications such as supply chain management, thief-prevention and so on …

A secure and lightweight RFID-enabled protocol for IoT healthcare environment: A vector space based approach

M Shariq, K Singh - Wireless Personal Communications, 2022 - Springer
Over some past decades, the data related to traditional medical privacy and many other
similar cases are at serious risk of disclosure by a third party or an adversary. The risk of …

RFID ownership transfer protocol based on cloud

T Cao, X Chen, R Doss, J Zhai, LJ Wise, Q Zhao - Computer Networks, 2016 - Elsevier
RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there
are few research works which combine RFID ownership transfer schemes with Cloud …

A novel security authentication protocol based on physical unclonable function for RFID healthcare systems

H Xu, X Chen, F Zhu, P Li - Wireless Communications and …, 2021 - Wiley Online Library
The Radio Frequency Identification (RFID) technology has been integrated into healthcare
systems for the purpose of improving healthcare management. However, people have …

Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing

M Shariq, M Conti, K Singh, C Lal, AK Das… - Computer Networks, 2024 - Elsevier
With the continuing growth in various research domains such as Artificial Intelligence (AI),
Machine Learning (ML), Big Data Analytics (BDA), and Cloud Computing (CC), the Internet …

Cloud-based remote RFID authentication for security of smart internet of things applications

MI Ahmed, G Kannan - Journal of Information & Knowledge …, 2021 - World Scientific
Radio frequency is the technology which enables smart labels to things. Thus, even physical
things can participate in computing process. It is becoming popular due to its technological …