Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions

P Gope, J Lee, TQS Quek - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Radio frequency identification (RFID) has been considered one of the imperative
requirements for implementation of Internet-of-Things applications. It helps to solve the …

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

P Gope, R Amin, SKH Islam, N Kumar… - Future Generation …, 2018 - Elsevier
With the rapid development of device-to-device and machine-to-machine communication,
there is an exponential increase in the usage of various smart applications, such as …

Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial Internet of Things

E Lara, L Aguilar, MA Sanchez, JA García - Sensors, 2020 - mdpi.com
The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect
and control production systems. Its benefits include supply chain monitoring and machine …

Review of different classes of RFID authentication protocols

A Ibrahim, G Dalkılıc - Wireless Networks, 2019 - Springer
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations
of RFID technology are security and privacy concerns. Many methods, including encryption …

Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography

K Mansoor, A Ghani, SA Chaudhry, S Shamshirband… - Sensors, 2019 - mdpi.com
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the
underlying open architecture for communication between the RFID devices may lead to …

You can clone but you cannot hide: A survey of clone prevention and detection for RFID

K Bu, M Weng, Y Zheng, B Xiao… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Radio-frequency identification (RFID) is one of the driving technologies for Internet of
Things. The architecture-succinctness and cost-effectiveness of RFID tags promise their …

Untraceable sensor movement in distributed IoT infrastructure

P Gope, T Hwang - IEEE Sensors Journal, 2015 - ieeexplore.ieee.org
Recent advances in information and communication technologies and embedded systems
have given rise to a new disruptive technology, the Internet of Things (IoTs). IoT allows …

Counting RFID tags efficiently and anonymously

H Han, B Sheng, CC Tan, Q Li… - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
Radio Frequency IDentification (RFID) technology has attracted much attention due to its
variety of applications, eg, inventory control and object tracking. One important problem in …

Fast tag searching protocol for large-scale RFID systems

Y Zheng, M Li - IEEE/ACM Transactions On Networking, 2012 - ieeexplore.ieee.org
Fast searching a particular subset in a large number of products attached with radio
frequency identification (RFID) tags is of practical importance for a variety of applications, but …

Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks

P Gope, J Lee, TQS Quek - IEEE Sensors journal, 2016 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) include spatially allotted autonomous instruments that
employ sensors to check environmental or physical conditions. These autonomous …