2020
DOI: 10.3390/s20051366
|View full text |Cite
|
Sign up to set email alerts
|

SKINNY-Based RFID Lightweight Authentication Protocol

Abstract: With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive attention. In traditional RFID systems, the communication channel between the tag and the reader is vulnerable to various threats, including denial of service, spoofing, and desynchronization. Thus, the confidentiality and integrity of the transmitted data cannot be gu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 21 publications
0
12
0
Order By: Relevance
“…Recently, Xiao proposed a mutual authentication protocol based on lightweight block cipher SKINNY [28] and named it LRSAS protocol [29]. Although they claimed optimal security, we present an efficient desynchronization attack against it which can be extended to traceability attack.…”
Section: A Related Work and Motivationmentioning
confidence: 98%
“…Recently, Xiao proposed a mutual authentication protocol based on lightweight block cipher SKINNY [28] and named it LRSAS protocol [29]. Although they claimed optimal security, we present an efficient desynchronization attack against it which can be extended to traceability attack.…”
Section: A Related Work and Motivationmentioning
confidence: 98%
“…This Java code is decrypted. A TCP/IP link is used to return the decrypted plain message to LabVIEW and can be further processed [92]. The results are as follows:…”
Section: Cloningmentioning
confidence: 99%
“…In [45], the authors presented two lightweight RFID protocols that provide security, identity authentication, and privacy and have multiple tag groups. They used a filtering process to decrease collision between tags, sleep activation www.ijacsa.thesai.org mechanism, RFID system, and computing load.…”
Section: A Authentication Protocols For Radio Frequency Identificationmentioning
confidence: 99%
“…Both protocols proved effective in protecting against many types of attacks such as restart attack (RA), trace attack (TA), denial of service attack (DoS), and security forwarding (FS). The difference between the two papers is that the authors in [45] used the SKINNY encryption algorithm for the data used by the tag and reader to achieve mutual authentication. In our opinion, their protocol was good because it balanced security requirements and costs.…”
Section: A Critical Review Of Radio Frequency Identification Securitymentioning
confidence: 99%