Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

[HTML][HTML] ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags

M Shariq, K Singh, C Lal, M Conti, T Khan - Computer Networks, 2022 - Elsevier
Abstract Internet of Things (IoT) technologies rapidly evolve and are used in many real-life
applications. One of the core technologies used in various IoT applications is Radio …

Lightweight cloud computing-based RFID authentication protocols using PUF for e-healthcare systems

TF Lee, KW Lin, YP Hsieh, KC Lee - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
In the presence of convenience, cloud computing services have increasingly become used
to resolve low-latency and high-efficiency issues. In particular, they can help medical staff …

A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system

B Chander, K Gopalakrishnan - Computer Communications, 2022 - Elsevier
As a result of remarkable and continuous progress in Micro-Electro-Mechanical
technologies, improved user-friendliness of low cast telecommunications like IoTs, mobile …

Study of the operation process of the e-commerce oriented ecosystem of 5Ge base station, which supports the functioning of independent virtual network segments

V Kovtun, I Izonin - Journal of Theoretical and Applied Electronic …, 2021 - mdpi.com
According to specifications, flexible services for traffic management should be implemented
within the 5G platform in order to improve its efficiency, which is and will remain an actual …

Applicability of communication technologies in internet of things: a review

P Jhingta, A Vasudeva, M Sood - … : Proceedings of ICICC 2022, Volume 3, 2022 - Springer
The advancement in technology has made interaction among objects a reality. A network of
devices can be created by linking them via the Internet and facilitating communication …

SecMAP: a secure RFID mutual authentication protocol for healthcare systems

F Zhu - IEEE Access, 2020 - ieeexplore.ieee.org
In recent years, radio frequency identification (RFID) technology has been applied to
construct better healthcare systems, offering various healthcare services that can benefit all …

Secured authentication of RFID devices using lightweight block ciphers on FPGA platforms

P Anusha, PR Rao, NP Rai - IEEE Access, 2023 - ieeexplore.ieee.org
Near Field Communication (NFC) has emerged as a pivotal wireless technology for short-
range data exchange between devices, including smartphones and wearables. Leveraging …

A RFID-integrated framework for tag anti-collision in UAV-aided VANETs

Y He, D Wang, F Huang, Y Zhang, R Zhang, X Yan - Remote Sensing, 2021 - mdpi.com
In this paper, we investigate tags in anti-collision applications of radio frequency
identification (RFID) technology in unmanned aerial vehicle (UAV)-aided vehicular ad hoc …

RFID 安全认证协议综述

寇广岳, 魏国珩, 平源, 刘鹏 - 计算机工程与科学, 2023 - joces.nudt.edu.cn
在物联网发展中, RFID 技术以其轻量化的优势在物联网体系中占据重要地位. 同时, RFID
安全认证协议也因物理条件限制受到安全威胁. 首先, 通过对现行主流RFID …