2021
DOI: 10.1016/j.comcom.2020.12.004
|View full text |Cite
|
Sign up to set email alerts
|

An ultra light weight and secure RFID batch authentication scheme for IoMT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…The scheme's security is formally analyzed. Other authentication schemes in IoT-related environments have been also suggested in [27,28].…”
Section: Related Workmentioning
confidence: 99%
“…The scheme's security is formally analyzed. Other authentication schemes in IoT-related environments have been also suggested in [27,28].…”
Section: Related Workmentioning
confidence: 99%
“…It was observed that radio frequency identification authentication is utilized on many occasions for the IoMT to identify end nodes and users. In order to avoid tag collisions of RFIDs, a scheme is proposed by [ 105 ] using aloha. The scheme uses the dynamic framed slotted aloha, which is an anticollision protocol [ 106 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Figure 9 shows the authentication architectures for IoMT systems. Many researchers proposed robust, centralized authentication schemes by authentication servers in cloud-based IoMT systems [25,[44][45][46]. They adopted a flat, centralized architecture where all nodes are authenticated through cloud-based authentication servers.…”
Section: Authentication Architecturesmentioning
confidence: 99%
“…Possession credentials refer to the information possessed by the entity, such as a smart card or passport for user authentication, and radio waves for device authentication. The researchers in [25,[44][45][46] used Radio-Frequency Identification (RFID) technology as a possession credential to identify devices anonymously and perform the authentication process. Other device authentication schemes used Physically Unclonable Function (PUF) to identify IoMT devices [49,52].…”
Section: Authentication Credentialsmentioning
confidence: 99%