2019
DOI: 10.1016/j.future.2018.10.040
|View full text |Cite
|
Sign up to set email alerts
|

Security enhancement on an RFID ownership transfer protocol based on cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…In 2016, Cao et al [44] introduces a cloud-assisted RFID ownership transfer protocol based on quadratic residues. However, Lee et al [45] found this protocol is vulnerable to impersonation and desynchronization attacks, and proposed an enhancement. In 2019, Zhou et al [46] proposed an authentication protocol for TIMSs, which is based on quadratic residues and hash function.…”
Section: Related Workmentioning
confidence: 99%
“…In 2016, Cao et al [44] introduces a cloud-assisted RFID ownership transfer protocol based on quadratic residues. However, Lee et al [45] found this protocol is vulnerable to impersonation and desynchronization attacks, and proposed an enhancement. In 2019, Zhou et al [46] proposed an authentication protocol for TIMSs, which is based on quadratic residues and hash function.…”
Section: Related Workmentioning
confidence: 99%
“…Research articles concerning industrial vision systems describe, for example, an automatic surface detection (Zhou et al 2019), pre-inspection of steel frames (Martinez et al 2019), embedded vision systems (Zidek et al 2016), and stereo vision sensing (OrRiordan et al 2018). Additional related research aspects of RFID system were presented in works focused on the security of tags (Han et al 2019), detection of missing tags (Lee et al 2019), and new searching protocol (Liu et al 2019).…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…Assume that Nb is the number of neighbors detected by the reader and F is a binary flag denoting the multiplebeacon transmission, the parameter pair ( , ) Nb F can represent the density of the reader network. Therefore, each reader is assigned a integer value (4) In addition, Xia-NFRA provides a back-off mechanism to allow the colliding reader to use the following formula to reselect a random integer…”
Section: ) Xia-nframentioning
confidence: 99%
“…RFID is a short-range communication technology that enables objects to be identified without direct contact. Due to the advantages of non-contact, easy implementation, high environmental adaptation and sufficient durability, RFID is not only widely used in academia fields, such as indoor localization [1], object tracking [2], data processing [3] and security [4], but also in industrial fields, such as smart warehouse [5], supply chain management [6], agriculture engineering [7] and healthcare service [8]. Generally, a typical RFID system consists of readers, tags, middleware and application software.…”
Section: Introductionmentioning
confidence: 99%