2020
DOI: 10.1155/2020/8436917
|View full text |Cite
|
Sign up to set email alerts
|

The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security

Abstract: In many fields, multiple RFID tags are often combined into a group to identify an object. An RFID grouping-proof protocol is utilized to prove the simultaneous existence of a group of tags. However, many current grouping-proof protocols cannot simultaneously provide privacy preserving, forward security, and the authentication between reader/verifier and tags, which are vulnerable to trace attack, privacy leakage, and desynchronization attack. To improve the secure performance of the current grouping-proof prot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…In [46], the authors introduced a group-based authentication protocol for the RFID system. It uses only mod operation and bitwise XOR.…”
Section: A Authentication Protocols For Radio Frequency Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…In [46], the authors introduced a group-based authentication protocol for the RFID system. It uses only mod operation and bitwise XOR.…”
Section: A Authentication Protocols For Radio Frequency Identificationmentioning
confidence: 99%
“…In [44], we liked that they used the activate-sleep mechanism efficiently and filtering process which reduced collision on the tags. In the paper [46], the authors not only used a pseudo system that provides a feature on the side of the tag but also used that feature in the reader to generate the nonce. Their protocol only uses bit-wise XOR operation in the authentication stage along with symmetric encryption and decryption.…”
Section: A Critical Review Of Radio Frequency Identification Securitymentioning
confidence: 99%
“…In RFID systems, to achieve one-end or mutual authentication, readers and tags may employ authentication protocols (e.g. [9], [10], [11], [12], [13]). Despite recent advances in the domain of RFID communication, the design of secure authentication protocols has remained as a challenge yet [14], given the constraints of those devices, e.g.…”
Section: Introductionmentioning
confidence: 99%