RFID systems: A survey on security threats and proposed solutions

P Peris-Lopez, JC Hernandez-Castro… - … : IFIP TC6 11th …, 2006 - Springer
Abstract Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as
smart labels are emerging as one of the most pervasive computing technology in history …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

Survey: an overview of lightweight RFID authentication protocols suitable for the maritime internet of things

G Mudra, H Cui, MN Johnstone - Electronics, 2023 - mdpi.com
The maritime sector employs the Internet of Things (IoT) to exploit many of its benefits to
maintain a competitive advantage and keep up with the growing demands of the global …

[PDF][PDF] LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags

P Peris-Lopez… - Proc. of 2nd …, 2006 - rfidsec2013.iaik.tugraz.at
Low-cost Radio Frequency Identification (RFID) tags are devices of very limited
computational capabilities, where only 250-3K logic gates can be devoted to security-related …

M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags

P Peris-Lopez, JC Hernandez-Castro… - … and Computing: Third …, 2006 - Springer
Abstract Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as
smart labels are emerging as one of the most pervasive computing technologies in history …

EMAP: An efficient mutual-authentication protocol for low-cost RFID tags

P Peris-Lopez, JC Hernandez-Castro… - On the Move to …, 2006 - Springer
RFID tags are devices of very limited computational capabilities, which only have 250-3K
logic gates that can be devoted to security-related tasks. Many proposals have recently …

A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective

HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …

Adaptive placement and migration policy for an STT-RAM-based hybrid cache

Z Wang, DA Jiménez, C Xu, G Sun… - 2014 IEEE 20th …, 2014 - ieeexplore.ieee.org
Emerging Non-Volatile Memories (NVM) such as Spin-Torque Transfer RAM (STT-RAM)
and Resistive RAM (RRAM) have been explored as potential alternatives for traditional …

A case against currently used hash functions in RFID protocols

M Feldhofer, C Rechberger - … International Conferences" On the Move to …, 2006 - Springer
Designers of RFID security protocols can choose between a wide variety of cryptographic
algorithms. However, when implementing these algorithms on RFID tags fierce constraints …

From identification to authentication–a review of RFID product authentication techniques

M Lehtonen, T Staake, F Michahelles - Networked RFID Systems and …, 2008 - Springer
Authentication has an important role in many RFID applications for providing security and
privacy. In this paper we focus on investigating how RFID can be used in product …