A comprehensive taxonomy of security and privacy issues in RFID

A Kumar, AK Jain, M Dua - Complex & Intelligent Systems, 2021 - Springer
Internet of things (IoT) is made up of many devices like sensors, tags, actuators, mobile
devices, and many more. These devices interact with each other without human interaction …

Desynchronization attack on RAPP ultralightweight authentication protocol

Z Ahmadian, M Salmasizadeh, MR Aref - Information processing letters, 2013 - Elsevier
RAPP (RFID Authentication Protocol with Permutation) is a recently proposed and efficient
ultralightweight authentication protocol. Although it maintains the structure of the other …

Ultralightweight RFID Authentication Protocols for Low‐Cost Passive RFID Tags

M Khalid, U Mujahid… - Security and …, 2019 - Wiley Online Library
The field of pervasive computing especially the Internet of Things (IoT) network is evolving
due to high network speed and increased capacity offered by the 5G communication system …

Analysis on security and privacy guidelines: RFID-based IoT applications

HA Abdulghani, NA Nijdam, D Konstantas - Ieee Access, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) comprises many technologies, among them is Radio Frequency
Identification (RFID), which can be used to track single or multiple objects. This technology …

RCIA: A new ultralightweight RFID authentication protocol using recursive hash

U Mujahid, M Najam-ul-Islam… - International Journal of …, 2015 - journals.sagepub.com
RFID is one of the most protuberant systems in the field of ubiquitous computing. Since RFID
tags have limited computation capabilities, numerous ultralightweight authentication …

Passive secret disclosure attack on an ultralightweight authentication protocol for internet of things

M Safkhani, N Bagheri - The Journal of Supercomputing, 2017 - Springer
Abstract Internet of Things (IoT) is a technology in which for any object the ability to send
data via communications networks is provided. Ensuring the security of Internet services and …

A differential privacy-based query model for sustainable fog data centers

M Du, K Wang, X Liu, S Guo… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the increasing computation and storage capabilities of mobile devices, the concept of
fog computing was proposed to tackle the high communication delay inherent in cloud …

A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP

U Mujahid, M Najam-ul-Islam, S Sarwar - Wireless Personal …, 2017 - Springer
Abstract Radio Frequency IDentification (RFID) is one of the most promising identification
schemes in the field of pervasive systems. Unique identification and non-line of sight …

Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI protocols

M Safkhani, N Bagheri - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Tian et al. proposed a permutation based authentication protocol entitled RAPP. However, it
came out very soon that it suffers from several security treats such as desynchronization …

A New Ultralightweight RFID Protocol for Low-Cost Tags: RAP

X Zhuang, Y Zhu, CC Chang - Wireless Personal Communications, 2014 - Springer
Several ultralightweight radio frequency identification (RFID) authentication protocols have
been proposed in recent years. However, all of these protocols are reported later that they …