An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography

D He, S Zeadally - IEEE internet of things journal, 2014 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …

Survey: Vulnerability analysis of low-cost ECC-based RFID protocols against wireless and side-channel attacks

S Gabsi, V Beroulle, Y Kieffer, HM Dao, Y Kortli… - Sensors, 2021 - mdpi.com
The radio frequency identification (RFID) system is one of the most important technologies of
the Internet of Things (IoT) that tracks single or multiple objects. This technology is …

Efficient RFID authentication using elliptic curve cryptography for the internet of things

H Shen, J Shen, MK Khan, JH Lee - Wireless personal communications, 2017 - Springer
Abstract The Internet of Things (IoT) is an expansion of Internet-based sensing, processing
and networking. As a key technique of the IoT, the Radio Frequency Identification (RFID) …

Towards continuous authentication in internet of things based on secret sharing scheme

OO Bamasag, K Youcef-Toumi - Proceedings of the WESS'15: Workshop …, 2015 - dl.acm.org
In this paper, we propose a novel continuous authentication protocol for the Internet of
Things based on secret sharing scheme. This protocol provides secure and efficient …

Ultralightweight RFID Authentication Protocols for Low‐Cost Passive RFID Tags

M Khalid, U Mujahid… - Security and …, 2019 - Wiley Online Library
The field of pervasive computing especially the Internet of Things (IoT) network is evolving
due to high network speed and increased capacity offered by the 5G communication system …

RFID authentication scheme based on hyperelliptic curve signcryption

U Ali, MYIB Idris, MNB Ayub, I Ullah, I Ali… - IEEE …, 2021 - ieeexplore.ieee.org
The implementation of efficient security mechanisms for Radio Frequency Identification
(RFID) system has always been a continuous challenge due to its limited computing …

Simulation and cost analysis of group authentication protocols

A Kumar, K Gopal, A Aggarwal - 2016 Ninth International …, 2016 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking
and group proof construction. The multi-round protocols for authentication and group proof …

A novel ECC-based lightweight authentication protocol for internet of things devices

A Tewari, BB Gupta - International Journal of High …, 2019 - inderscienceonline.com
In spite of being a promising technology which will make our lives a lot easier we cannot be
oblivious to the fact IoT is not safe from online threat and attacks. Thus, along with the growth …

[PDF][PDF] The role of RFID in green IoT: A survey on technologies, challenges and a way forward

ZYM Yusoff, MK Ishak, KA Alezabi - Adv. Sci. Technol. Eng. Syst. J, 2021 - academia.edu
The Internet of Things (IoT) is a technology that enables communication between everyday
life using different sensor actuators that work together to identify, capture, and distribute …

A robust anonymity preserving authentication protocol for IoT devices

A Tewari, BB Gupta - 2018 IEEE International Conference on …, 2018 - ieeexplore.ieee.org
In spite of being a promising technology which will make our lives a lot easier we cannot be
oblivious to the fact IoT is not safe from online threat and attacks. Thus, along with the growth …