2,377 Hits in 6.5 sec

An Efficient Authentication and Key Agreement Protocol in RFID System [chapter]

Eun-Jun Yoon, Kee-Young Yoo
2008 Lecture Notes in Computer Science  
In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader.  ...  They also proved the security of the protocol through the extended strand space model. This paper presents a more efficient authentication and key agreement protocol for RFID system than He et al.'  ...  Therefore, in the RFID system, it is an important challenge to design an efficient and secure protocol which can be used in the low-cost tag [1, 2, 3, 4, 12] . In 2007, He et al.  ... 
doi:10.1007/978-3-540-88140-7_29 fatcat:gqtw2xrurfgsphmbecahndfe5y

Research on RFID authentication Protocol in Internet of Vehicles

Pengcheng Sun, Fei Li
2021 Scholars Journal of Engineering and Technology  
This paper proposes an RFID authentication protocol in the Internet of Vehicles based on the certification center (CA).  ...  The classic RFID authentication scheme cannot meet the special security and confidentiality requirements of RFID in Internet of Vehicles.  ...  Kumar [7] proposed an elliptic curve-based RFID in-vehicle cloud computing (RSEAP) secure and efficient authentication protocol.  ... 
doi:10.36347/sjet.2021.v09i05.001 fatcat:mbjfb4xbyja2tk7t34gja744iy

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
authentication with privacy, deniable authentication with privacy, authentication with mutual anonymity, authentication and key agreement with privacy, and three-factor authentication with privacy.  ...  Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID  ...  key agreement, RFID authentication, and handover authentication.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy [chapter]

Shaohui Wang, Sujuan Liu, Danwei Chen
2013 Communications in Computer and Information Science  
Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system.  ...  The challenge is hidden from the eavesdropping through the technique of Diffie-Hellman key agreement protocol.  ...  Besides we propose an efficient ECC-based authentication protocol for RFID system named Challenge-Hiding GPS scheme, and the scheme can provide backward privacy.  ... 
doi:10.1007/978-3-642-36252-1_43 fatcat:2ynymzxaenhjdaot2cuh4iicwy

Security and resilience for smart devices and applications

Damien Sauveron, Konstantinos Markantonakis, Christos Verikoukis
2014 EURASIP Journal on Wireless Communications and Networking  
Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices.  ...  There are many open questions for these challenging issues such as security of protocols and applications, secure architecture, frameworks and methodologies for next generation wireless networks and respective  ...  However, special thanks go to Professor Luc Vandendorpe, Editor-in-Chief, for approving and making this issue possible and to the staff of EURASIP Journal on Wireless Communications and Networks for their  ... 
doi:10.1186/1687-1499-2014-123 fatcat:ljmyjdcaezf7ngavdybaz3ftbm

Research on RFID Security Authentication Protocol Based on HASH Function

Zhen-huan CHEN, Xue-feng PAN
2018 DEStech Transactions on Engineering and Technology Research  
The protocol, while taking into account the tag overhead, increases the use of tags for information transmission and reader authentication, ensuring the security and efficiency of the authentication process  ...  on the existing RFID authentication protocol, a RFID security scheme based on hash function is proposed.  ...  Improved security and efficiency are the advantages of an improved protocol that increases the security of RFID systems to a certain extent.  ... 
doi:10.12783/dtetr/ecar2018/26353 fatcat:ibr6ev7h45aavpwfmigeibtrhy

Security of an RFID Protocol for Supply Chains

Ton van Deursen, Sasa Radomirovic
2008 2008 IEEE International Conference on e-Business Engineering  
We discuss several shortcomings in this protocol related to mutual authentication, unlinkability, and desynchronization and suggest possible improvements.  ...  We analyze the security requirements on RFID protocols to be used in supply chains.  ...  Therefore, the security of tags, readers, and any other components of an RFID system is as important as the cost-effectiveness and time-efficiency.  ... 
doi:10.1109/icebe.2008.44 dblp:conf/icebe/DeursenR08 fatcat:6i62oij77red3ndh4ukykyvpai

Security Model of RFID Communication Provable Security Based on Password Authentication

Jichao Liu, Kun Li
2021 International Journal of Autonomous and Adaptive Communications Systems  
A new access authentication protocol and a security association protocol supporting fast handover are proposed.  ...  According to the RFID system level, the RFID equipment is layered and safely managed to construct a model that directly proves the authenticity of the logo without the need for third-party certification  ...  Acknowledgements Research and development of robot for the aged, Item category: Youth Fund, Item number: QN2019328.  ... 
doi:10.1504/ijaacs.2021.10032587 fatcat:3bh2zddg3bfjlbhgmshlheodk4

Research of RFID Certification Security Protocol based on Hash Function and DES Algorithm

Bin Xu, Li-hui ZHANG, Xiao-pin TAN
2013 Journal of Networks  
The certification process analysis of several typical security protocols is based on existing RFID authentication protocol. It proposed an improved bidirectional authentication algorithm.  ...  The protocol has anti-replay, impedance analysis, forgery, and tracking performance, and is suitable for the distributed system.  ...  THE IMPROVED PROTOCOL DESIGN This paper presents an improved RFID authentication protocol based on Hash function and DES algorithm. This protocol is improved on the base of several agreements on.  ... 
doi:10.4304/jnw.8.10.2368-2375 fatcat:bja57vrz45a2xev5qckyx6vufi

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures [chapter]

Michael Braun, Ulrike Meyer, Susanne Wetzel
2010 Lecture Notes in Computer Science  
The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data  ...  In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem while maintaining efficiency and identity privacy.  ...  Conclusion and Future Work In this paper, we introduced new mutual authentication and key agreement protocols targeted at multi-domain RFID systems.  ... 
doi:10.1007/978-3-642-12368-9_9 fatcat:ew2kqfqugja5lomh43wnozpdzi

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing

Vikas Kumar, Rahul Kumar, Srinivas Jangirala, Saru Kumari, Sachin Kumar, Chien-Ming Chen, Jie Cui
2022 Security and Communication Networks  
Our security analysis clearly shows important security pitfalls in RSEAP2 such as mutual authentication, session key agreement, and denial-of-service attack.  ...  IoT requires a safe and consistent RFID authentication system.  ...  Acknowledgments is study did not receive any funding in any form.  ... 
doi:10.1155/2022/8998339 fatcat:3wjyergo7vc4ngbukmvbnejbpe

Tripartite Authentication Protocol RFID/NFC Based on ECC

Yongshuang Wei, Jianhua Chen
2020 International Journal of Network Security  
An RFID security three-party mutual authentication protocol based on elliptic curve cryptography (ECC) is designed in this paper.  ...  with RFID and NFC system.  ...  Related Work In studies of RFID authentication protocol based on ECC, most of them focus on the security and efficiency.  ... 
dblp:journals/ijnsec/WeiC20 fatcat:p4vdzs3anbhh7li3w6iwlyeeii

Design and Implementation of RFID Authentication Protocol based on Simple Symmetric Key (SSK) Algorithm

2020 International journal of recent technology and engineering  
In this research article, we proposed new authentication protocol as a method to protect privacy, especially for affordable cost and functionalities and have limited power consumption, memory and effective  ...  Though, the security, cost, time and task of RFID are accountable to identify the feasible authentication protocol according to the business environment.  ...  Many research studies have explored the security problems in smart systems, such as access control, key agreement and data upload smart systems contain many network technology problems to be solved [8  ... 
doi:10.35940/ijrte.f7131.038620 fatcat:pf6azqk5gbc3tptjxoiudra5ua

A Survey on Single Sign-On Mechanisms for Distributed Computer Networks

N Gomathy, Dr.N Radha
2014 International Journal of Computer Trends and Technology  
Particularly, in this survey investigate the different single sign-on mechanisms to meet credential privacy and reliability of authentication.  ...  In the distributed computer networks, user verification is an important process for the security.  ...  The important problems in the RFID system are privacy and authentication security.  ... 
doi:10.14445/22312803/ijctt-v13p125 fatcat:ogiibyxpqzdtlcf7m7fnpntcgi

Lightweight Security Protocols for Internet of Things: A Review

Deepti Rani, Maharshi Dayanand University, Rohtak, Haryana (India)
2019 International Journal of Advanced Trends in Computer Science and Engineering  
Smart devices and IoT applications have been widely used in many fields of social living, social production, home and industrial automation which have made people's life efficient and convenient.  ...  But in recent years, ubiquitous deployment of some tools and technologies has raised several concerns related to the privacy and security in IoT enabled smart environment.  ...  ECDH protocol is used for key agreement where peer entities generate a secret key and it is used for operations which involve a private key.  ... 
doi:10.30534/ijatcse/2019/58832019 fatcat:7wtxzomxcnfu7latkr3bl443e4
« Previous Showing results 1 — 15 out of 2,377 results