2014
DOI: 10.1049/iet-ifs.2012.0241
|View full text |Cite
|
Sign up to set email alerts
|

Group‐based key array authentication protocol in radio frequency identification systems

Abstract: For the purposes of information security and privacy between readers and tags, identity authentication is a significant issue for radio frequency identification (RFID) systems. In this study, the authors propose a novel security group-based key array authentication protocol, which is suitable for a large scale RFID environment. Based on a key array, this protocol can generate an authentication key for each pair of reader and tag with lower storage. Adding an identifier update phase, they design the authenticat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The lightweight protocols mainly use cyclic redundancy code (CRC) operator, message authentication code (MAC), and hash function to realize identity authentication [8][9][10][11]. The middleweight protocols introduce the fullfledged symmetric/asymmetric encryption [e.g., elliptic curve cryptography (ECC)] for the applications with higher security requirements (e.g., finance, and military) [12][13][14][15]. However, several complicated protocols may be limited by the tag hardware requirements such as power consumption, storage space, and computational capacity.…”
Section: Introductionmentioning
confidence: 99%
“…The lightweight protocols mainly use cyclic redundancy code (CRC) operator, message authentication code (MAC), and hash function to realize identity authentication [8][9][10][11]. The middleweight protocols introduce the fullfledged symmetric/asymmetric encryption [e.g., elliptic curve cryptography (ECC)] for the applications with higher security requirements (e.g., finance, and military) [12][13][14][15]. However, several complicated protocols may be limited by the tag hardware requirements such as power consumption, storage space, and computational capacity.…”
Section: Introductionmentioning
confidence: 99%
“…Security solutions for RF systems can be classified by the weight of cryptographic primitives used-Middle-weight, light-weight and ultra-lightweight solutions. Middleweight solutions [22], [23] for applications with higher security requirements such as finance, and military) use full symmetric/asymmetric encryption (e.g., elliptic curve cryptography (ECC)). Lightweight solutions use operations and functions such as cyclic redundancy code (CRC) operator, message authentication code (MAC) and hash function.…”
mentioning
confidence: 99%