2014
DOI: 10.1007/s11277-014-2189-x
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Improvement on Two RFID Authentication Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…It solves EURFID's [12] IDS collision problem. But Wang et al [13] proved that RAPLT was not secured at all. It was also vulnerable to desynchronization attack.…”
Section: Related Workmentioning
confidence: 99%
“…It solves EURFID's [12] IDS collision problem. But Wang et al [13] proved that RAPLT was not secured at all. It was also vulnerable to desynchronization attack.…”
Section: Related Workmentioning
confidence: 99%
“…Many classic solutions 3,24–26 have been proposed to ensure the disappearance of security 18,26,27 and privacy 2,17,22,23,28 problems in RFID systems, and the these solutions are mainly divided into two categories: one is physical security mechanism; the other is password security mechanism that attempts to use a variety of passwords. Because the physical security mechanism is limited by factors such as the particularity and limitations of the RFID system, the password security mechanism is favored by researchers, especially the RFID security authentication mechanism 1,25,2933 with hash function 34,35 is embedded in the system which has a more unique advantage in contrast with the physical security mechanism. In this article, we consider the security, cost, and complexity of RFID system.…”
Section: Rfid Mutual Authentication Protocol Based On Shared Secret Hmentioning
confidence: 99%