2021
DOI: 10.1109/access.2021.3112554
|View full text |Cite
|
Sign up to set email alerts
|

Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications

Abstract: The implementation of RFID technology has globally impacted several industries and this revolution has improved the aspects of service delivery in many sectors, such as logistics, supply chain visibility, access control, military, and agri-food sector. RFID provides several security services to protect the data transmitted between a tag and a reader in the IoT environment. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in thes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 65 publications
0
7
0
Order By: Relevance
“…Figure 11 illustrates FIGURE 13. ID size n id as a function of the cue size n cue for (q = 251, k i , k o = 251) {PPM, OOC1}-RS2 codes of dimensions k i ∈ {2, 3, 4, 5} of the outer RS code, and for (q = 251, m, r ) PPM-RM codes of parameter pairs (m, r ) ∈ { (3,15), (4,9), (5,7), (6,6)}. ID codes of the same color share the same overall block code length n and overall block code dimension k. Increasing the dimension k i of the inner RS code causes a minor increase in the ID size n id , while increasing the cue size n cue significantly.…”
Section: A Dimension Of Outer Rs Codementioning
confidence: 99%
See 2 more Smart Citations
“…Figure 11 illustrates FIGURE 13. ID size n id as a function of the cue size n cue for (q = 251, k i , k o = 251) {PPM, OOC1}-RS2 codes of dimensions k i ∈ {2, 3, 4, 5} of the outer RS code, and for (q = 251, m, r ) PPM-RM codes of parameter pairs (m, r ) ∈ { (3,15), (4,9), (5,7), (6,6)}. ID codes of the same color share the same overall block code length n and overall block code dimension k. Increasing the dimension k i of the inner RS code causes a minor increase in the ID size n id , while increasing the cue size n cue significantly.…”
Section: A Dimension Of Outer Rs Codementioning
confidence: 99%
“…For the error probability characteristics, Figure 17 illustrates the diverging behavior of the error probability bound λ 2 from the mean error probability p err for an increasing ID size n id . The cue size n cue follows the stepwise increases of the dimension k i ∈ [2,3,4,5,6] of the inner RS code. We increase the dimension k i of the inner RS code if the dimension k o otherwise (if k i is not increased) exceeds the threshold q k i −1 that we determined in Equation (40).…”
Section: ) Cue Size and Error Probability As A Function Of Id Sizementioning
confidence: 99%
See 1 more Smart Citation
“…It cannot also provide user anonymity. On the other hand, the RFID based mutual authentication protocol in [169] requires the execution of complex elliptic curve encryption. As such, it incurs high computing overheads [170], which is inefficient for the tags.…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
“…Desynchronization attacks can break this condition by blocking protocol messages or forcing protocol parties to modify their shared secret values to different values, preventing the parties from authenticating each other and destroying service availability. Many protocols have been developed in the literature to satisfy CIA security standards; however, multiple instances of attacks [2,[10][11][12][13][14] against them show that they have failed to achieve the needed security. As a result, attempts to build a secure protocol are still continuing, and new attacks are emerging that provide designers fresh insight into how to (not) design a protocol.…”
Section: Problem Definitionmentioning
confidence: 99%