2020
DOI: 10.3906/elk-2004-5
|View full text |Cite
|
Sign up to set email alerts
|

A novel grouping proof authentication protocol for lightweight devices:GPAPXR+

Abstract: Radio frequency identification (RFID) tags that meet EPC Gen2 standards are used in many fields such as supply chain operations. The number of the RFID tags, smart cards, wireless sensor nodes, and Internet of things devices is increasing day by day and the areas where they are used are expanding. These devices are very limited in terms of the resources they have. For this reason, many security mechanisms developed for existing computer systems cannot be used for these devices. In order to ensure secure commun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…However, this scheme is not suitable for ad-hoc networks since it relies on a secure server. Aydin et al [14] have designed a novel authentication protocol for lightweight devices, mainly radio-frequency identification systems. Their electronic product code generation-2 (EPC-Gen2)-compatible protocol also works for groups of devices and requires minimal resources to be implemented.…”
Section: Related Workmentioning
confidence: 99%
“…However, this scheme is not suitable for ad-hoc networks since it relies on a secure server. Aydin et al [14] have designed a novel authentication protocol for lightweight devices, mainly radio-frequency identification systems. Their electronic product code generation-2 (EPC-Gen2)-compatible protocol also works for groups of devices and requires minimal resources to be implemented.…”
Section: Related Workmentioning
confidence: 99%
“…Security and privacy are both very important issues for payment and communication so payment systems have to be secure and provide privacy. For mobile phones, IoT and lightweight devices so many security mechanisms or challenges are created and investigated in the literature [10][11][12][13][14][15][16][17][18][19][20].…”
Section: Related Workmentioning
confidence: 99%
“…An unsecured card can easily be copied to retrieve or modify confidential information. Some research has been carried out to solve the security and confidentiality problems posed by RFID [3]- [5]. Implementing  Design and implementation of a cryptographic algorithm based on … (Sanae Habibi) 577 an authentication process stands out as one of the most effective methods to ensure security and privacy measures.…”
Section: Introductionmentioning
confidence: 99%