2017
DOI: 10.1007/s11277-017-4912-x
|View full text |Cite
|
Sign up to set email alerts
|

Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols

Abstract: Radio Frequency IDentification (RFID) technology has been increasingly integrated into numerous applications for authentication of objects or individuals. However, because of its limited computation power, RFID technology may cause several security and privacy issues such as tracking the owner of the tag, cloning of the tags and etc. Recently, two chaotic map-based authentication protocols have been proposed for low-cost RFID tags in order to eliminate these issues. In this paper, we give the security analysis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 30 publications
0
0
0
Order By: Relevance