2020
DOI: 10.1007/s11277-020-07330-1
|View full text |Cite
|
Sign up to set email alerts
|

An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 23 publications
0
19
0
Order By: Relevance
“…Though we have used a secure communication channel and ECDLP based secure session and public keys for ESOTP for secure communication using the communication model described in the previous subsection, it must be considered that a situation where the ESOTP has to work in an insecure channel which is wholly controlled by an adversary 풜 for communication and the messages transmitted among the participating entities can be compromised. Considering this situation, the de‐facto standard model, Dolav‐Yao (DY) treat model, 31,45 is signified for ESOTP scheme that is generally used to analyze the authentication as well as various key management schemes 3,4,12,16–38 discussed in “Literature Review” section. Moreover, some more threats are considered keeping in mind that the adversary 풜 can perform following additional activities.…”
Section: Different Models Used In Esotp Schemementioning
confidence: 99%
See 3 more Smart Citations
“…Though we have used a secure communication channel and ECDLP based secure session and public keys for ESOTP for secure communication using the communication model described in the previous subsection, it must be considered that a situation where the ESOTP has to work in an insecure channel which is wholly controlled by an adversary 풜 for communication and the messages transmitted among the participating entities can be compromised. Considering this situation, the de‐facto standard model, Dolav‐Yao (DY) treat model, 31,45 is signified for ESOTP scheme that is generally used to analyze the authentication as well as various key management schemes 3,4,12,16–38 discussed in “Literature Review” section. Moreover, some more threats are considered keeping in mind that the adversary 풜 can perform following additional activities.…”
Section: Different Models Used In Esotp Schemementioning
confidence: 99%
“…Using same procedure, the attacker can also performs its activities as a partner, computes the response value rs ic using PUF pi ( c i , N i ) function and sends those random messages { rs i1 … … rs iq } to owner to get the advantage as a partner. Claim We have also analyzed the update protocol of IoT based object tracking protocol proposed by Baruah and Dhal scheme 23 and found that the partner receives the nonce N c from the cloud server in an unencrypted format or without maintain any hashed structure. Further, partner calculates rs ic using PUF pi ( c i , N i ) and cc i using h ( c i ⊕ PRF(n) ⊕ N c ⊕ rs ic ) and forwards those messages ( rs ic , cc i and N c ) to tag in an unencrypted structure or without any hashed structure to communicate between them as a valid partner. Claim In the update protocol, total 24 numbers of XOR operators are used for and the total computation cost only for using the XOR operation = (24 × 3.85) ms = 92.4 ms, where the time complexity regarding the implementation of modular exponential operation where T EMod = 3.85 ms 25 . So, the total computation cost for Baruah and Dhal scheme 23 has become 144.094 ms that is much greater compared to ESOTP that is 46.614 ms.…”
Section: Analysis Of the Object Tracking Protocol Proposed By Baruah And Dhal Scheme23mentioning
confidence: 99%
See 2 more Smart Citations
“…RFID, or Radio Frequency Identification refers to a technology by which the reader captures digital data encoded in RFID tags or smart labels through radio waves [1]. RFID is identical to barcoding, in that data is retrieved from either a tag or mark by a computer that stores data in a database.…”
Section: Introductionmentioning
confidence: 99%