2017
DOI: 10.24138/jcomss.v10i3.122
|View full text |Cite
|
Sign up to set email alerts
|

Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things

Abstract: Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio frequency based addressing scheme in IoT. Major security challenge in resource constraint RFID networks is how to achieve traditional CIA security i.e. Confidentiality, Integrity and Authentication. Computational and co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…9 shows comparative throughput analysis of the proposed protocol with Kumar et al protocol [1]. Results show that the proposed protocol is having better throughput compared to Kumar et al protocol [46][47][48][49][50][51][52][53] because of connected hierarchical network construction and consideration of small-scale (50 to 500 nodes) to large scale (3000 to 5000 nodes) networks. Fig.…”
Section: Outlier Detection Approachmentioning
confidence: 99%
“…9 shows comparative throughput analysis of the proposed protocol with Kumar et al protocol [1]. Results show that the proposed protocol is having better throughput compared to Kumar et al protocol [46][47][48][49][50][51][52][53] because of connected hierarchical network construction and consideration of small-scale (50 to 500 nodes) to large scale (3000 to 5000 nodes) networks. Fig.…”
Section: Outlier Detection Approachmentioning
confidence: 99%