2011
DOI: 10.1049/iet-com.2010.0625
|View full text |Cite
|
Sign up to set email alerts
|

Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems

Abstract: Radio frequency identification (RFID)-based sensor systems are emerging as a new generation of wireless sensor networks by inherently integrating identification, sensing, communications and computation capabilities. Security and privacy are critical issues in dealing with a large amount of sensed data. In the study, the authors propose a distributed key array authentication protocol (KAAP) that provides classified security protection. KAAP is synthetically analysed in three aspects: logic, security and perform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…It is an extension to the protocol KAAP [10] which has a key in the same group to resist the attacks among groups.…”
Section: Proposed Gkaap Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…It is an extension to the protocol KAAP [10] which has a key in the same group to resist the attacks among groups.…”
Section: Proposed Gkaap Protocolmentioning
confidence: 99%
“…In our protocol, the access list of tag includes the reader group ID, the number of which is T. The tag does not store the authentication key, but only a i , the number of which is also T. Then, the tag must store its identifier, the length of which is L. The storage of a tag is 2T + L. The value T is lower than L which is also defined as the length of the access list in KAAP. The communication load and computation load is similar to the protocol presented in paper [10], but the delivery message increase L to update from a reader to a tag. A reader connects with DB directly, so its ability to transmit additional data are very strong.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Thereinto, authentication protocols are the principal schemes that own ubiquitous applicability. There are three main categories of authentication protocols according to the weight of cryptographic primitives [13]. Concretely, the ultra-lightweight protocols mainly apply the bitwise logical operators and pseudo-random number generator (PRNG) to achieve safeguard [5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…The lightweight protocols mainly use cyclic redundancy code (CRC) operator, message authentication code (MAC), and hash function to realize identity authentication [8][9][10][11]. The middleweight protocols introduce the fullfledged symmetric/asymmetric encryption [e.g., elliptic curve cryptography (ECC)] for the applications with higher security requirements (e.g., finance, and military) [12][13][14][15]. However, several complicated protocols may be limited by the tag hardware requirements such as power consumption, storage space, and computational capacity.…”
Section: Introductionmentioning
confidence: 99%