2021
DOI: 10.1109/jiot.2021.3059047
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…Therefore, Sun et al [28] utilized a hash function to encrypt private data for better authentication security. To solve the problem of high communication overhead when authenticating tags in batches, Yang et al [29] proposed an efficient authentication grouping-proof protocol based on symmetric keys and bit collisions, which can solve the conflict issue of one-time authentication of multiple tags. (4) RFID authentication protocol based on ECC Wu et al [30] introduced a UAV-assisted IoV authentication protocol that utilizes ECC and hash functions for encryption.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, Sun et al [28] utilized a hash function to encrypt private data for better authentication security. To solve the problem of high communication overhead when authenticating tags in batches, Yang et al [29] proposed an efficient authentication grouping-proof protocol based on symmetric keys and bit collisions, which can solve the conflict issue of one-time authentication of multiple tags. (4) RFID authentication protocol based on ECC Wu et al [30] introduced a UAV-assisted IoV authentication protocol that utilizes ECC and hash functions for encryption.…”
Section: Related Workmentioning
confidence: 99%
“…To analyze the security of the authentication scheme proposed in this paper, certain assumptions must be made regarding the adversary's attack capabilities. This section introduces attack models commonly used in many related studies [27][28][29], which will be used for security analysis. The assumptions of the adversary model are as follows:…”
Section: Adversary Modelmentioning
confidence: 99%
“…At the same time, compared with traditional methods of authenticating each group member individually, group authentication can reduce the computational overheads in the multi-user setting, and this feature is particularly attractive in the resource-constrained environment, such as ITS. Since then, the extended research on group authentication has become very active and has been applied in many areas [13][14][15]. Li et al [16] proposed a group authentication and key agreement protocol for machine type communication (MTC) in the long-term evaluation advanced (LTE-A) networks.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, except for one time pad cipher, symmetric encryption algorithms are not unconditionally secure. In terms of efficiency, key distribution and management is a bottleneck in symmetric key cryptography, which produce huge communication and storage cost [13]. Hence, public key encryption appeared, which 1 compares the proposed scheme with the original scheme and other latest group authentication protocols in terms of security and encryption method.…”
Section: Performancementioning
confidence: 99%