2010 IEEE International Conference on RFID-Technology and Applications 2010
DOI: 10.1109/rfid-ta.2010.5529941
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and practical authentication of PUF-based RFID tags in supply chains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…The most simple authentication method [6,10,45,47] employs an unprotected strong PUF only, as shown in Figure 7(a). Figure 8 represents the corresponding protocol.…”
Section: Basic Authentication (2001)mentioning
confidence: 99%
“…The most simple authentication method [6,10,45,47] employs an unprotected strong PUF only, as shown in Figure 7(a). Figure 8 represents the corresponding protocol.…”
Section: Basic Authentication (2001)mentioning
confidence: 99%
“…There is particular interest in applying PUFs' ability to generate unique signatures to enhancing the security of RFID authentication-just a few examples are [9,5,2]. PUFs are also used in the symmetric-key authentication protocol proposed by [12].…”
Section: Signature Generationmentioning
confidence: 99%
“…From Fig.2, we can see that each End only need to complete three hash and two MAC operations in the whole verification, which is very efficient. As to the delay of PUF operation, we can omit it because the PUF operation is carried out by hardware and only takes tens of milliseconds [13]. Therefore the verification delay of MAP scheme is short and can be satisfied the requirement of DTMSN.…”
Section: B Performance Analysismentioning
confidence: 99%
“…Though the space cost is much less than the schemes in [11][12][13][14], it is easy to exceed the storage limit of sensor nodes when there are many members in a DTMSN. Therefore, the scale of network cannot be very large.…”
Section: ) Verification Delaymentioning
confidence: 99%
See 1 more Smart Citation