The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …

Defining strong privacy for RFID

A Juels, SA Weis - ACM Transactions on Information and System …, 2009 - dl.acm.org
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our
contribution is twofold:(i) We propose a simple, formal definition of strong privacy useful for …

On privacy models for RFID

S Vaudenay - International conference on the theory and application …, 2007 - Springer
We provide a formal model for identification schemes. Under this model, we give strong
definitions for security and privacy. Our model captures the notion of a powerful adversary …

Lightweight mutual authentication and ownership transfer for RFID systems

L Kulseng, Z Yu, Y Wei, Y Guan - 2010 proceedings IEEE …, 2010 - ieeexplore.ieee.org
The promise of RFID technology has been evidently foreseeable due to the low cost and
high convenience value of RFID tags. However, the low-cost RFID tags poses new …

Analysing unlinkability and anonymity using the applied pi calculus

M Arapinis, T Chothia, E Ritter… - 2010 23rd IEEE computer …, 2010 - ieeexplore.ieee.org
An attacker that can identify messages as coming from the same source, can use this
information to build up a picture of targets' behaviour, and so, threaten their privacy. In …

A privacy preserving framework for RFID based healthcare systems

F Rahman, MZA Bhuiyan, SI Ahamed - Future generation computer …, 2017 - Elsevier
Abstract RFID (Radio Frequency IDentification) is anticipated to be a core technology that
will be used in many practical applications of our life in near future. It has received …

Mutual authentication in RFID: security and privacy

RI Paise, S Vaudenay - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007,
Vaudenay studied security and privacy models for these protocols. We extend this model to …

[PDF][PDF] 前向隐私安全的低成本犚犉犐犇认证协议

马昌社 - 计算机学报, 2011 - cjc.ict.ac.cn
摘要标签成本和隐私安全是制约RFID 技术在物联网中得到广泛应用的主要因素. 因此,
设计隐私安全且标签生产成本低的RFID 认证协议是学术界和工业界共同追求的目标 …

Universally composable and forward-secure RFID authentication and authenticated key exchange

T Van Le, M Burmester, B de Medeiros - … of the 2nd ACM symposium on …, 2007 - dl.acm.org
Recently, a universally composable framework for RFID authentication protocols providing
availability, anonymity, and authenticity was proposed. In this paper we extend that …

EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol

YK Lee, L Batina, I Verbauwhede - 2008 IEEE international …, 2008 - ieeexplore.ieee.org
Operational and security requirements for RFID systems such as system scalability,
anonymity and anti-cloning are difficult to obtain due to constraints in area, memory, etc. Due …