Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol

YP Liao, CM Hsiao - Ad hoc networks, 2014 - Elsevier
Abstract IoT (Internet of Things) is a type of network where ICT (Information and
Communication Technology) links any physical objects to the internet to perform information …

Low-cost untraceable authentication protocols for RFID

YK Lee, L Batina, D Singelée… - Proceedings of the third …, 2010 - dl.acm.org
The emergence of pervasive computing devices has raised several privacy issues. In this
paper, we address the risk of tracking attacks in RFID networks. Our contribution is …

Untraceable RFID authentication protocols: Revision of EC-RAC

YK Lee, L Batina, I Verbauwhede - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
Radio Frequency IDentiflcation (RFID) systems are steadily becoming paramount due to
their vast applications such as supply chains, inventory, tolling, baggage management …

Secure and privacy-preserving rfid authentication scheme for internet of things applications

ML Das, P Kumar, A Martin - Wireless Personal Communications, 2020 - Springer
Privacy issue has become a crucial concern in internet of things (IoT) applications ranging
from home appliances to vehicular networks. RFID system has found enormous scope in IoT …

A method for proving unlinkability of stateful protocols

D Baelde, S Delaune, S Moreau - 2020 IEEE 33rd Computer …, 2020 - ieeexplore.ieee.org
The rise of contactless and wireless devices such as mobile phones and RFID chips justifies
significant concerns over privacy, and calls for communication protocols that ensure some …

A secure ECC-based RFID authentication scheme using hybrid protocols

YP Liao, CM Hsiao - Advances in Intelligent Systems and Applications …, 2013 - Springer
Abstract Radio Frequency Identification (RFID) has grown tremendously and has been
widely applied in various applications. RFID tags are becoming very attractive devices …

CampusSense—A smart vehicle parking monitoring and management system using ANPR cameras and android phones

MY Aalsalem, WZ Khan - 2017 19th International Conference …, 2017 - ieeexplore.ieee.org
Vehicle parking monitoring and management has become a big challenge for educational
institutions with increasing enrollments, high percentage of vehicle ownership and …

Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs

L Batina, YK Lee, S Seys, D Singelée… - Personal and Ubiquitous …, 2012 - Springer
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to
generate evidence that they have been scanned simultaneously, various new schemes …

Elliptic curve cryptography-based RFID authentication resisting active tracking

HY Chien - Wireless Personal Communications, 2017 - Springer
The challenge of authentication for radio frequency identification (RFID) with low computing
capacities call for computation-efficient authentication that can achieve mutual …