2013
DOI: 10.1002/dac.2538
|View full text |Cite
|
Sign up to set email alerts
|

Secure and efficient lightweight RFID authentication protocol based on fast tag indexing

Abstract: SUMMARYDuring the radio-frequency identification authentication process, it is of great significance to quickly find out the target tag from all tags stored in the database, because it affects the authentication performance to a great extent. Most of the existing schemes use the Hash or pseudorandom number generator operation to locate the target tag, but if the number of tags is extremely large, vast Hash or pseudorandom number generator operations may take much time and lower the authentication efficiency. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 17 publications
0
18
0
Order By: Relevance
“…supplants the reader and sends 16 − 1 does as follows: supplants the reader and sends 16 − 1 does as follows:…”
Section: Execution Phasementioning
confidence: 99%
See 4 more Smart Citations
“…supplants the reader and sends 16 − 1 does as follows: supplants the reader and sends 16 − 1 does as follows:…”
Section: Execution Phasementioning
confidence: 99%
“…The complexity of the proposed attack is eavesdropping one session of the protocol, impersonating the reader to the tag 2 times and doing 2 16 evaluations of the given attack. The complexity of the proposed attack is eavesdropping one session of the protocol, impersonating the reader to the tag 2 times and doing 2 16 evaluations of the given attack.…”
Section: Once Again Supplants the Reader And Sendsmentioning
confidence: 99%
See 3 more Smart Citations