Safety, Security, and Reliability of Robotic Systems 2020
DOI: 10.1201/9781003031352-15
|View full text |Cite
|
Sign up to set email alerts
|

Authentication in RFID scheme based on elliptic curve cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Amit et al [17] proposed a scheme where they used the concept of cluster head and made the communication between the vehicle and the cluster head, but the scheme suffers from the privileged insider attack. Some other authentication schemes which are based on IoT application [24][25][26][27][28].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Amit et al [17] proposed a scheme where they used the concept of cluster head and made the communication between the vehicle and the cluster head, but the scheme suffers from the privileged insider attack. Some other authentication schemes which are based on IoT application [24][25][26][27][28].…”
Section: Related Workmentioning
confidence: 99%
“…•Elliptic curve discrete logarithm problem [6] Given the two points P, Q ∈ G, it is computationally hard to find the value of {a} from Q = a.P in polynomial time. Where a ∈ Z * q .…”
Section: Complexity Assumptionsmentioning
confidence: 99%
“…It is hard to compute the value of where the value of is unknown. Elliptic curve discrete logarithm problem Agrahari and Varma ( 2020 ) Given the two points , it is computationally hard to find the value of { a } from in polynomial time. Where .…”
Section: Mathematical Preliminariesmentioning
confidence: 99%
“…However, this scheme is cannot withstand tag and server impersonation attacks and hence privacy is not assured. In addition, it fails to provide both backward and forward key secrecy [54]- [56]. On the other hand, single-use signature based scheme has been developed in [57] while a joint verification scheme has been presented in [58] based on symmetric and biometric [59] encoding techniques.…”
Section: Related Workmentioning
confidence: 99%