2013
DOI: 10.1007/978-94-007-7262-5_106
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Mutual Authentication Protocol for RFID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…However, even based on this bit operation, as it has more than one security threat, a study of lightweight RFID mutual authentication is required to satisfy various security requirements. 15 …”
Section: Ntru Cryptographmentioning
confidence: 99%
“…However, even based on this bit operation, as it has more than one security threat, a study of lightweight RFID mutual authentication is required to satisfy various security requirements. 15 …”
Section: Ntru Cryptographmentioning
confidence: 99%
“…In BAN logic, the protocol is firstly converted into the formulas for the protocol idealization, then conducted reasonable initial assumptions. On the basis of the protocol idealizations and reasonable assumptions, the logical rules are used to deduce whether or not the protocol can achieve desired goal [14]. In this paper, the BAN logic is used to formally prove the security of the authentication protocol.…”
Section: About Ban Logicmentioning
confidence: 99%
“…Radio Frequency Identification (RFID) is a technology that exchanges data through electromagnetic waves or electromagnetic fields, which enables the non-contact identification of specific objects [1]. Due to the convenience and low cost of RFID technology, RFID technology has been widely used in industrial automation, commercial automation, transportation management, etc.…”
Section: Introductionmentioning
confidence: 99%