2019
DOI: 10.1109/access.2019.2954413
|View full text |Cite
|
Sign up to set email alerts
|

Prototype Device With Lightweight Protocol for Secure RFID Communication Without Reliable Connectivity

Abstract: The work of A. ALAMER was supported by the Ph.D. Scholarship provided by Tabuk University.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 47 publications
0
3
0
1
Order By: Relevance
“…Hashing algorithms are also exploited where the MD5 algorithm in [25] and SHA3-224 with Burrows-Abadi-Needham logic in [34] were used to increase integrity. Meanwhile, we can mention the IDEA cipher [35], Present [42], the modified Mickey 2.0 [21], and the multi-factor authentication schemes [12,27], among other alternative solutions that might replace the commonly used ones.…”
Section: Rfid Security Solutionsmentioning
confidence: 99%
“…Hashing algorithms are also exploited where the MD5 algorithm in [25] and SHA3-224 with Burrows-Abadi-Needham logic in [34] were used to increase integrity. Meanwhile, we can mention the IDEA cipher [35], Present [42], the modified Mickey 2.0 [21], and the multi-factor authentication schemes [12,27], among other alternative solutions that might replace the commonly used ones.…”
Section: Rfid Security Solutionsmentioning
confidence: 99%
“…Radio frequency identification (RFID) utilizes wireless communication technology to identify information stored on objects via electromagnetic field reading. Following recent technological advances in reading and storing information, RFID has become increasingly affordable [43]. One application of RFID is to manage inventory and curb inventory wastages, thereby reducing overall losses [44].…”
Section: ) Radio Frequency Identificationmentioning
confidence: 99%
“…The lightweight cryptography algorithms used for develop many applications like electronic clinical record prototype that designed to work with low-performance devices. These electronic clinical record seek to secure the information without losing optimal performance and ensure low computational consumption [2].…”
Section: Introductionmentioning
confidence: 99%