2017
DOI: 10.1007/s11276-017-1638-3
|View full text |Cite
|
Sign up to set email alerts
|

Review of different classes of RFID authentication protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(20 citation statements)
references
References 112 publications
0
20
0
Order By: Relevance
“…There are many algorithms available in the literature for securing the communication among the sensors and systems. Most of the secured algorithms are complex and computation intensive in nature [2]. Wireless sensor networks are composed of Radio Frequency Identification (RFID) tags and low power-consuming sensors [3].…”
Section: Introductionmentioning
confidence: 99%
“…There are many algorithms available in the literature for securing the communication among the sensors and systems. Most of the secured algorithms are complex and computation intensive in nature [2]. Wireless sensor networks are composed of Radio Frequency Identification (RFID) tags and low power-consuming sensors [3].…”
Section: Introductionmentioning
confidence: 99%
“…In [14], a survey is given on the different classes of RFID authentication protocols, with a distinction in fully fledged, simple, lightweight, and ultralightweight protocols. Fully fledged protocols are defined as protocols supporting both symmetric and asymmetric operations and thus are the focus of this work.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, the scheme of [15] has been compared with [14,19,20], the scheme of [16] with [21][22][23][24][25], the scheme of [17] with [14,20,26,27], and the scheme of [18] with [14,20,26,28]. From Table 2 of [14], it can be concluded that [18] is the most complete scheme with respect to security features and resistance against important security threats. However, when having a closer look to [18], we can also conclude that this scheme is not scalable as the reader needs to perform exhaustive search in the whole list of tags to verify the validity of the signature.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…ECC cryptosystems implementations designed for low-resource and low-cost applications are called lightweight implementations [ 4 ]. To differentiate, a lightweight ECC implementation corresponds to an optimized implementation in terms of areas and hardware resources, while a lightweight RFID protocol [ 5 ] refers to protocol that uses only cyclic redundancy checks (CRC) and random number generators (RNG). This is also efficient security protocol, which is not the purpose of this paper to study.…”
Section: Introductionmentioning
confidence: 99%