2015
DOI: 10.1155/2015/642180
|View full text |Cite
|
Sign up to set email alerts
|

RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash

Abstract: RFID is one of the most protuberant systems in the field of ubiquitous computing. Since RFID tags have limited computation capabilities, numerous ultralightweight authentication protocols have been proposed to provide privacy and security. However all the previously proposed ultralightweight mutual authentication protocols have some security apprehensions and are vulnerable to various desynchronization and full disclosure attacks. This paper proposes a new ultralightweight mutual authentication protocol to pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 42 publications
(22 citation statements)
references
References 28 publications
0
22
0
Order By: Relevance
“…Based on the initial object-finding request, the SecureFind scheme can obtain the information the service provider. Based on the vulnerability of two published protocols RRAP [202] and RCIA [203], Luo et al [204] proposed recently a new ultra-lightweight mutual authentication protocol, which doesn't use any unbalanced operations like OR and AND.…”
Section: Rfid Authentication With Privacymentioning
confidence: 99%
“…Based on the initial object-finding request, the SecureFind scheme can obtain the information the service provider. Based on the vulnerability of two published protocols RRAP [202] and RCIA [203], Luo et al [204] proposed recently a new ultra-lightweight mutual authentication protocol, which doesn't use any unbalanced operations like OR and AND.…”
Section: Rfid Authentication With Privacymentioning
confidence: 99%
“…There are many hybrid nontriangular UMAPs available in the literature. In this subsection, the protocols under consideration are RFID Authentication Protocol with Permutation (RAPP) [4], RFID Authentication Protocol for Low cost Tags (RAPLT) [40], Robust Confidentiality Integrity and Authentication (RCIA) protocol [41], and Succinct and Lightweight Authentication Protocol (SLAP) [30].…”
Section: Umaps With Hybrid Nontriangular Functionmentioning
confidence: 99%
“…Since 2006, numerous UMAPs have been proposed for the EPC C1G2 identification system. However, most of these protocols were very weak and were found to be vulnerable within one year of their introduction [19,42,43]. The reason behind this hasty failure was lack of compact security analysis of the protocol at the design stage.…”
Section: Cryptanalysis Models For Umapsmentioning
confidence: 99%
“…A series of recently proposed Ultra-Lightweight protocols (between 2015 and 2017) has got a structure very similar to a first protocol called RAP P . Some examples are the protocols R 2 AP P , RCIA [3], KM AP [4], SLAP [1] and SASI+ [2]; they are identified under the name GU M AP (Generalized Ultra-Lightweight Mutual Autentication Protocols). These protocols follow a similar structure: first of all, both the Tag and the Reader know two IDs: , and k old 1 k old 2 .…”
Section: The Gumap Protocolsmentioning
confidence: 99%
“…In order to easily perform this task, we can simply count the number of bits of each substring, for each input string of the function. For A this list will be A div = [5,4,4,4,4,4,3,4] (the first number of the list is 5 because the length of the first substring of A, A 22 , is 5), and for the same reasons, B div = [3,5,5,3,4,4,4,4]. Once we have this lists it is easy to compute the new substrings-schemes: we start by fetching the first element from B div , in this case 3, and so we count the first 3 bits (from left to right) in A: (111), this is now the new first substring of A.…”
Section: Rearrangementioning
confidence: 99%