2015 International Conference on Information Networking (ICOIN) 2015
DOI: 10.1109/icoin.2015.7057870
|View full text |Cite
|
Sign up to set email alerts
|

A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(21 citation statements)
references
References 13 publications
0
21
0
Order By: Relevance
“…Later, researchers found that the abuse of encryption often results in a high communication overhead and requires high hardware resources [16][17][18]. On the other hand, with the development of society, people are increasingly concerned about their privacy and security, and the requirements for privacy protection are getting higher.…”
Section: Relative Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Later, researchers found that the abuse of encryption often results in a high communication overhead and requires high hardware resources [16][17][18]. On the other hand, with the development of society, people are increasingly concerned about their privacy and security, and the requirements for privacy protection are getting higher.…”
Section: Relative Workmentioning
confidence: 99%
“…Tags are used to collect data in the IoT environment, the NFC device is just like readers, it is used to retrieve data from tags. The cloud server is used to authenticate tags and readers, and even the stored data read from NFC devices [16,24]. When we want to achieve authentication between devices, we mainly focus on the following two requirements.…”
Section: The Requirements Of Mobile Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…Jung [10] Abughazalah et al [13] Sekhar and Sarvabhatla [12] Pourghomi et al [11] Thammarat et al [16] Proposed XOR, and R: rotate functions.…”
Section: Bank Authentication and Key Updatementioning
confidence: 99%
“…In addition, applying an offline key generation technology can increase resistance to brute force attacks [18].…”
Section: Brute Force Attackmentioning
confidence: 99%