An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography

D He, S Zeadally - IEEE internet of things journal, 2014 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …

A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol

YP Liao, CM Hsiao - Ad hoc networks, 2014 - Elsevier
Abstract IoT (Internet of Things) is a type of network where ICT (Information and
Communication Technology) links any physical objects to the internet to perform information …

Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value

JS Cho, SS Yeo, SK Kim - Computer communications, 2011 - Elsevier
Radio Frequency IDentification (RFID) system is a contactless automatic identification
system using small, low-cost RFID tags. It enables recognition of the tag information via …

Efficient RFID authentication using elliptic curve cryptography for the internet of things

H Shen, J Shen, MK Khan, JH Lee - Wireless personal communications, 2017 - Springer
Abstract The Internet of Things (IoT) is an expansion of Internet-based sensing, processing
and networking. As a key technique of the IoT, the Radio Frequency Identification (RFID) …

Generative adversarial network-based rogue device identification using differential constellation trace figure

Z Chen, L Peng, A Hu, H Fu - EURASIP Journal on Wireless …, 2021 - Springer
With the dramatic development of the internet of things (IoT), security issues such as identity
authentication have received serious attention. The radio frequency (RF) fingerprint of IoT …

A secure ECC-based RFID authentication scheme using hybrid protocols

YP Liao, CM Hsiao - Advances in Intelligent Systems and Applications …, 2013 - Springer
Abstract Radio Frequency Identification (RFID) has grown tremendously and has been
widely applied in various applications. RFID tags are becoming very attractive devices …

Improvement of the hash-based RFID mutual authentication protocol

MH Dehkordi, Y Farzaneh - Wireless personal communications, 2014 - Springer
Radio frequency identification (RFID) is a popular kind of automatic identification
technologies that uses radio frequencies. Many security and privacy problems my be raised …

[HTML][HTML] SRFID: A hash-based security scheme for low cost RFID systems

WI Khedr - Egyptian Informatics Journal, 2013 - Elsevier
Radio Frequency Identification (RFID) technology is a promising technology. It uses radio
waves to identify objects. Through automatic and real-time data acquisition, this technology …

An authentication protocol for low-cost RFID tags

CH Wei, MS Hwang, AYH Chin - International Journal of …, 2011 - inderscienceonline.com
Radio Frequency Identification (RFID) system can be read by radio wave within several
metres without having direct contact. Many research focus on improving security and privacy …

Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware

YK Lee, L Batina, D Singelee, B Preneel… - Towards Hardware …, 2010 - Springer
Recently, the use of RFID (radio frequency identification) technology has expanded
enormously. It was developed in the middle of the twentieth century and is today being …