Skip to main content
Erschienen in: Wireless Networks 3/2019

30.12.2017

Review of different classes of RFID authentication protocols

verfasst von: Alaauldin Ibrahim, Gokhan Dalkılıc

Erschienen in: Wireless Networks | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chinese RFID technology policy white paper, 2006. 15 Ministries and Commissions including Ministry of Science and Technology of PRC. Chinese RFID technology policy white paper, 2006. 15 Ministries and Commissions including Ministry of Science and Technology of PRC.
2.
Zurück zum Zitat Karmakar, N. C. (Ed.). (2011). Handbook of smart antennas for RFID systems. New York: Wiley. Karmakar, N. C. (Ed.). (2011). Handbook of smart antennas for RFID systems. New York: Wiley.
4.
Zurück zum Zitat Vajda, I., & Buttyán, L. (2003). Lightweight authentication protocols for low-cost RFID tags. In Second workshop on security in ubicomp (Vol. 2003, pp. 1–10). Vajda, I., & Buttyán, L. (2003). Lightweight authentication protocols for low-cost RFID tags. In Second workshop on security in ubicomp (Vol. 2003, pp. 1–10).
5.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). RFID systems: A survey on security threats and proposed solutions. In IFIP international conference on personal wireless communications (pp. 159–170). Springer, Berlin, Heidelberg. Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). RFID systems: A survey on security threats and proposed solutions. In IFIP international conference on personal wireless communications (pp. 159–170). Springer, Berlin, Heidelberg.
6.
Zurück zum Zitat Chien, H. Y. (2007). Sasi: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.CrossRef Chien, H. Y. (2007). Sasi: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.CrossRef
7.
Zurück zum Zitat Tuyls, P., & Batina, L. (2006). RFID tags for anti-counterfeiting. In D. Pointcheval (Ed.), Topics in cryptology–CT-RSA 2006 (pp. 115–131). Berlin: Springer.CrossRef Tuyls, P., & Batina, L. (2006). RFID tags for anti-counterfeiting. In D. Pointcheval (Ed.), Topics in cryptology–CT-RSA 2006 (pp. 115–131). Berlin: Springer.CrossRef
8.
Zurück zum Zitat Feldhofer, M., Dominikus, S., & Wolkerstorfer, J. (2004). Strong authentication for RFID systems using the AES algorithm. In M. Joye & J.-J. Quisquater (Eds.), Cryptographic hardware and embedded systems CHES 2004 (pp. 357–370). Berlin: Springer.MATHCrossRef Feldhofer, M., Dominikus, S., & Wolkerstorfer, J. (2004). Strong authentication for RFID systems using the AES algorithm. In M. Joye & J.-J. Quisquater (Eds.), Cryptographic hardware and embedded systems CHES 2004 (pp. 357–370). Berlin: Springer.MATHCrossRef
9.
Zurück zum Zitat Tsudik, G. (2006). YA-TRAP: Yet another trivial RFID authentication protocol. In Fourth annual IEEE international conference on pervasive computing and communications workshops, PerCom Workshops 2006. IEEE. Tsudik, G. (2006). YA-TRAP: Yet another trivial RFID authentication protocol. In Fourth annual IEEE international conference on pervasive computing and communications workshops, PerCom Workshops 2006. IEEE.
10.
Zurück zum Zitat Weis, S. A., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2004). Security and privacy aspects of low-cost radio frequency identification systems. In D. Hutter, G. Müller, W. Stephan, & M. Ullmann (Eds.), Security in pervasive computing (pp. 201–212). Berlin, Heidelberg: Springer.CrossRef Weis, S. A., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2004). Security and privacy aspects of low-cost radio frequency identification systems. In D. Hutter, G. Müller, W. Stephan, & M. Ullmann (Eds.), Security in pervasive computing (pp. 201–212). Berlin, Heidelberg: Springer.CrossRef
11.
Zurück zum Zitat Bringer, J., Chabanne, H., & Dottax, E. (2006). HB++: A lightweight authentication protocol secure against some attacks. In Second international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2006 (pp. 28–33). IEEE. Bringer, J., Chabanne, H., & Dottax, E. (2006). HB++: A lightweight authentication protocol secure against some attacks. In Second international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2006 (pp. 28–33). IEEE.
12.
Zurück zum Zitat Chien, H. Y., & Chen, C. H. (2007). Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces, 29(2), 254–259.CrossRef Chien, H. Y., & Chen, C. H. (2007). Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces, 29(2), 254–259.CrossRef
13.
Zurück zum Zitat Duc, D., Park J., & Lee, H. (2006). Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning. In 2006 symposium on cryptography and information security (pp. 17–20). Duc, D., Park J., & Lee, H. (2006). Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning. In 2006 symposium on cryptography and information security (pp. 17–20).
14.
Zurück zum Zitat Gilbert, H., Robshaw, M., & Sibert, H. (2005). Active attack against HB+: A provably secure lightweight authentication protocol. Electronics Letters, 41(21), 1169–1170.CrossRef Gilbert, H., Robshaw, M., & Sibert, H. (2005). Active attack against HB+: A provably secure lightweight authentication protocol. Electronics Letters, 41(21), 1169–1170.CrossRef
15.
Zurück zum Zitat Li, T., & Deng, R. (2007). Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol. In The second international conference on availability, reliability and security, 2007, ARES 2007 (pp. 238–245). IEEE. Li, T., & Deng, R. (2007). Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol. In The second international conference on availability, reliability and security, 2007, ARES 2007 (pp. 238–245). IEEE.
16.
Zurück zum Zitat Li, T., & Wang, G. (2007). Security analysis of two ultralightweight RFID authentication protocols. In H. Venter, M. Eloff, L. Labuschagne, J. Eloff, & R. von Solms (Eds.), New approaches for security, privacy and trust in complex environments (pp. 109–120). New York: Springer.CrossRef Li, T., & Wang, G. (2007). Security analysis of two ultralightweight RFID authentication protocols. In H. Venter, M. Eloff, L. Labuschagne, J. Eloff, & R. von Solms (Eds.), New approaches for security, privacy and trust in complex environments (pp. 109–120). New York: Springer.CrossRef
18.
Zurück zum Zitat Lee, Y. K., Batina, L., & Verbauwhede, I. (2008). EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In 2008 IEEE international conference on RFID, (pp. 97–104). IEEE. Lee, Y. K., Batina, L., & Verbauwhede, I. (2008). EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In 2008 IEEE international conference on RFID, (pp. 97–104). IEEE.
19.
Zurück zum Zitat Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., & Verbauwhede, I. (2007). Public-key cryptography for RFID-tags. In Fifth annual IEEE international conference on pervasive computing and communications workshops, 2007 (pp. 217–222). IEEE. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., & Verbauwhede, I. (2007). Public-key cryptography for RFID-tags. In Fifth annual IEEE international conference on pervasive computing and communications workshops, 2007 (pp. 217–222). IEEE.
20.
Zurück zum Zitat Van Deursen, T., & Radomirovic, S. (2008). Attacks on RFID Protocols. IACR Cryptology ePrint Archive, 2008(310), 1–56. Van Deursen, T., & Radomirovic, S. (2008). Attacks on RFID Protocols. IACR Cryptology ePrint Archive, 2008(310), 1–56.
21.
Zurück zum Zitat Bringer, J., Chabanne, H., & Icart, T. (2008). Cryptanalysis of EC-RAC, a RFID identification protocol. In Cryptology and network security (pp. 149–161). Springer, Berlin, Heidelberg. Bringer, J., Chabanne, H., & Icart, T. (2008). Cryptanalysis of EC-RAC, a RFID identification protocol. In Cryptology and network security (pp. 149–161). Springer, Berlin, Heidelberg.
22.
Zurück zum Zitat Lee, Y. K., Batina, L., & Verbauwhede, I. (2009). Untraceable RFID authentication protocols: Revision of EC-RAC. In 2009 IEEE international conference on RFID (pp. 178–185). IEEE. Lee, Y. K., Batina, L., & Verbauwhede, I. (2009). Untraceable RFID authentication protocols: Revision of EC-RAC. In 2009 IEEE international conference on RFID (pp. 178–185). IEEE.
23.
Zurück zum Zitat Lee, Y. K., Batina, L., Singelee, D., Preneel, B., & Verbauwhede, I. (2010). Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware. In A.-R. Sadeghi & D. Naccache (Eds.), Towards hardware intrinsic security (pp. 237–257). Berlin, Heidelberg: Springer.CrossRef Lee, Y. K., Batina, L., Singelee, D., Preneel, B., & Verbauwhede, I. (2010). Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware. In A.-R. Sadeghi & D. Naccache (Eds.), Towards hardware intrinsic security (pp. 237–257). Berlin, Heidelberg: Springer.CrossRef
24.
Zurück zum Zitat Zhang, X., Li, J., Wu, Y., & Zhang, Q. (2011). An ECDLP based randomized key RFID authentication protocol. In 2011 international conference on network computing and information security (NCIS) (Vol. 2, pp. 146–149). IEEE. Zhang, X., Li, J., Wu, Y., & Zhang, Q. (2011). An ECDLP based randomized key RFID authentication protocol. In 2011 international conference on network computing and information security (NCIS) (Vol. 2, pp. 146–149). IEEE.
25.
Zurück zum Zitat Liao, Y. P., & Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.CrossRef Liao, Y. P., & Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.CrossRef
26.
Zurück zum Zitat Moosavi, S. R., Nigussie, E., Virtanen, S., & Isoaho, J. (2014). An elliptic curve-based mutual authentication scheme for RFID implant systems. Procedia Computer Science, 32, 198–206.CrossRef Moosavi, S. R., Nigussie, E., Virtanen, S., & Isoaho, J. (2014). An elliptic curve-based mutual authentication scheme for RFID implant systems. Procedia Computer Science, 32, 198–206.CrossRef
27.
Zurück zum Zitat He, D., Kumar, N., Chilamkurti, N., & Lee, J. H. (2014). Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. Journal of Medical Systems, 38(10), 1–6.CrossRef He, D., Kumar, N., Chilamkurti, N., & Lee, J. H. (2014). Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. Journal of Medical Systems, 38(10), 1–6.CrossRef
28.
Zurück zum Zitat Zhao, Z. (2014). A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. Journal of Medical Systems, 38(5), 1–7.CrossRef Zhao, Z. (2014). A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. Journal of Medical Systems, 38(5), 1–7.CrossRef
29.
Zurück zum Zitat Chou, J. S. (2014). A secure RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.CrossRef Chou, J. S. (2014). A secure RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.CrossRef
30.
Zurück zum Zitat Zhang, Z., & Qi, Q. (2014). An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. Journal of Medical Systems, 38(5), 1–7.CrossRef Zhang, Z., & Qi, Q. (2014). An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. Journal of Medical Systems, 38(5), 1–7.CrossRef
31.
Zurück zum Zitat Jin, C., Xu, C., Zhang, X., & Zhao, J. (2015). A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography. Journal of Medical Systems, 39(3), 1–8.CrossRef Jin, C., Xu, C., Zhang, X., & Zhao, J. (2015). A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography. Journal of Medical Systems, 39(3), 1–8.CrossRef
32.
Zurück zum Zitat Farash, M. S., Nawaz, O., Mahmood, K., Chaudhry, S. A., & Khan, M. K. (2016). A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. Journal of Medical Systems, 40(7), 1–7.CrossRef Farash, M. S., Nawaz, O., Mahmood, K., Chaudhry, S. A., & Khan, M. K. (2016). A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. Journal of Medical Systems, 40(7), 1–7.CrossRef
33.
Zurück zum Zitat Ibrahim, A., & Dalkilic, G. (2017). An advanced encryption standard powered mutual authentication protocol based on elliptic curve cryptography for RFID, proven on WISP. Journal of Sensors, Article ID 2367312. Ibrahim, A., & Dalkilic, G. (2017). An advanced encryption standard powered mutual authentication protocol based on elliptic curve cryptography for RFID, proven on WISP. Journal of Sensors, Article ID 2367312.
34.
Zurück zum Zitat Kaps, J. P. (2008). Chaitea, cryptographic hardware implementations of xtea. In D. R. Chowdhury, V. Rijmen, & A. Das (Eds.), Progress in cryptology-INDOCRYPT 2008 (pp. 363–375). Berlin, Heidelberg: Springer.CrossRef Kaps, J. P. (2008). Chaitea, cryptographic hardware implementations of xtea. In D. R. Chowdhury, V. Rijmen, & A. Das (Eds.), Progress in cryptology-INDOCRYPT 2008 (pp. 363–375). Berlin, Heidelberg: Springer.CrossRef
35.
Zurück zum Zitat Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to “privacy-friendly” tags. In RFID privacy workshop (Vol. 82). Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to “privacy-friendly” tags. In RFID privacy workshop (Vol. 82).
36.
Zurück zum Zitat Tsudik, G. (2007). A family of dunces: Trivial RFID identification and authentication protocols. In Privacy enhancing technologies (pp. 45–61). Springer, Berlin, Heidelberg. Tsudik, G. (2007). A family of dunces: Trivial RFID identification and authentication protocols. In Privacy enhancing technologies (pp. 45–61). Springer, Berlin, Heidelberg.
37.
Zurück zum Zitat Rostampour, S., Namin, M. E., & Hosseinzadeh, M. (2014). A novel mutual RFID authentication protocol with low complexity and high security. International Journal of Modern Education and Computer Science (IJMECS), 6(1), 17–24.CrossRef Rostampour, S., Namin, M. E., & Hosseinzadeh, M. (2014). A novel mutual RFID authentication protocol with low complexity and high security. International Journal of Modern Education and Computer Science (IJMECS), 6(1), 17–24.CrossRef
38.
Zurück zum Zitat Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16(5), 702–705.CrossRef Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16(5), 702–705.CrossRef
39.
Zurück zum Zitat Qian, Z., Chen, C., You, I., & Lu, S. (2012). ACSP: A novel security protocol against counting attack for UHF RFID systems. Computers & Mathematics with Applications, 63(2), 492–500.MATHCrossRef Qian, Z., Chen, C., You, I., & Lu, S. (2012). ACSP: A novel security protocol against counting attack for UHF RFID systems. Computers & Mathematics with Applications, 63(2), 492–500.MATHCrossRef
40.
Zurück zum Zitat Han, S., Potdar, V., & Chang, E. (2007). Mutual authentication protocol for RFID tags based on synchronized secret information with monitor. In Computational science and its applications–ICCSA 2007 (pp. 227–238). Springer, Berlin, Heidelberg. Han, S., Potdar, V., & Chang, E. (2007). Mutual authentication protocol for RFID tags based on synchronized secret information with monitor. In Computational science and its applicationsICCSA 2007 (pp. 227–238). Springer, Berlin, Heidelberg.
41.
Zurück zum Zitat Qingling, C., Yiju, Z., & Yonghua, W. (2008). A minimalist mutual authentication protocol for RFID system & BAN logic analysis. In ISECS international colloquium on computing, communication, control, and management (Vol. 2, pp. 449–453). IEEE. Qingling, C., Yiju, Z., & Yonghua, W. (2008). A minimalist mutual authentication protocol for RFID system & BAN logic analysis. In ISECS international colloquium on computing, communication, control, and management (Vol. 2, pp. 449–453). IEEE.
42.
Zurück zum Zitat Chen, C. L., & Deng, Y. Y. (2009). Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Engineering Applications of Artificial Intelligence, 22(8), 1284–1291.CrossRef Chen, C. L., & Deng, Y. Y. (2009). Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Engineering Applications of Artificial Intelligence, 22(8), 1284–1291.CrossRef
43.
Zurück zum Zitat Chou, J. S. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.CrossRef Chou, J. S. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.CrossRef
44.
Zurück zum Zitat Dalkiliç, G., Özcanhan, M. H., & Çakır, H. Ş. (2014). Increasing key space at little extra cost in RFID authentications. Turkish Journal of Electrical Engineering & Computer Sciences, 22(1), 155–165.CrossRef Dalkiliç, G., Özcanhan, M. H., & Çakır, H. Ş. (2014). Increasing key space at little extra cost in RFID authentications. Turkish Journal of Electrical Engineering & Computer Sciences, 22(1), 155–165.CrossRef
45.
Zurück zum Zitat Liu, Y. (2008). An efficient RFID authentication protocol for low-cost tags. In IEEE/IFIP international conference on embedded and ubiquitous computing (Vol. 2, pp. 180–185). IEEE. Liu, Y. (2008). An efficient RFID authentication protocol for low-cost tags. In IEEE/IFIP international conference on embedded and ubiquitous computing (Vol. 2, pp. 180–185). IEEE.
46.
Zurück zum Zitat Toiruul, B., & Lee, K. (2006). An advanced mutual authentication algorithm using AES for RFID systems. International Journal of Computer Science and Network Security, 6(9), 156–162. Toiruul, B., & Lee, K. (2006). An advanced mutual authentication algorithm using AES for RFID systems. International Journal of Computer Science and Network Security, 6(9), 156–162.
47.
Zurück zum Zitat Ha, J., Moon, S., Nieto, J. M. G., & Boyd, C. (2007). Low-cost and strong-security RFID authentication protocol. In Emerging directions in embedded and ubiquitous computing (pp. 795–807). Springer, Berlin, Heidelberg. Ha, J., Moon, S., Nieto, J. M. G., & Boyd, C. (2007). Low-cost and strong-security RFID authentication protocol. In Emerging directions in embedded and ubiquitous computing (pp. 795–807). Springer, Berlin, Heidelberg.
48.
Zurück zum Zitat Özcanhan, M. H., Dalkılıç, G., & Utku, S. (2014). Cryptographically supported NFC tags in medication for better inpatient safety. Journal of Medical Systems, 38(8), 1–15.CrossRef Özcanhan, M. H., Dalkılıç, G., & Utku, S. (2014). Cryptographically supported NFC tags in medication for better inpatient safety. Journal of Medical Systems, 38(8), 1–15.CrossRef
49.
Zurück zum Zitat Peris-Lopez, P., Safkhanim, M., Bagheri, N., & Naderi, M. (2013). RFID in eHealth: How combat medications errors and strengthen patient safety. Journal of Medical and Biological Engineering, 33, 363–372.CrossRef Peris-Lopez, P., Safkhanim, M., Bagheri, N., & Naderi, M. (2013). RFID in eHealth: How combat medications errors and strengthen patient safety. Journal of Medical and Biological Engineering, 33, 363–372.CrossRef
50.
Zurück zum Zitat Hakeem, M. J., Raahemifar, K., & Khan, G. N. (2013). HPAP: A novel authentication scheme for RFID systems. In 26th annual ieee canadian conference on electrical and computer engineering (pp. 1–6). IEEE. Hakeem, M. J., Raahemifar, K., & Khan, G. N. (2013). HPAP: A novel authentication scheme for RFID systems. In 26th annual ieee canadian conference on electrical and computer engineering (pp. 1–6). IEEE.
51.
Zurück zum Zitat Chatmon, C., Le, T. V., & Burmester, M. (2006). Secure anonymous RFID authentication protocols (pp. 1–10). Technical Report TR-060112, Florida State Univeristy, Tallahassee. Chatmon, C., Le, T. V., & Burmester, M. (2006). Secure anonymous RFID authentication protocols (pp. 1–10). Technical Report TR-060112, Florida State Univeristy, Tallahassee.
52.
Zurück zum Zitat Changqing, O., Jixiong, W., Zhengyan, L., & Shengye, H. (2008). An enhanced security authentication protocol based on hash-lock for low-cost RFID. In 2nd international conference on anti-counterfeiting, security and identification (pp. 416–419). IEEE. Changqing, O., Jixiong, W., Zhengyan, L., & Shengye, H. (2008). An enhanced security authentication protocol based on hash-lock for low-cost RFID. In 2nd international conference on anti-counterfeiting, security and identification (pp. 416–419). IEEE.
53.
Zurück zum Zitat Srivastava, K., Awasthi, A. K., Kaul, S. D., & Mittal, R. C. (2015). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems, 39(1), 1–5.CrossRef Srivastava, K., Awasthi, A. K., Kaul, S. D., & Mittal, R. C. (2015). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems, 39(1), 1–5.CrossRef
54.
Zurück zum Zitat Cho, J. S., Yeo, S. S., & Kim, S. K. (2011). Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. Computer Communications, 34(3), 391–397.CrossRef Cho, J. S., Yeo, S. S., & Kim, S. K. (2011). Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. Computer Communications, 34(3), 391–397.CrossRef
55.
Zurück zum Zitat Shen, J., Tan, H., Moh, S., Chung, I., & Wang, J. (2016). An efficient RFID authentication protocol providing strong privacy and security. Journal of Internet Technology, 17(3), 443–455. Shen, J., Tan, H., Moh, S., Chung, I., & Wang, J. (2016). An efficient RFID authentication protocol providing strong privacy and security. Journal of Internet Technology, 17(3), 443–455.
56.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagor-da, A. (2006). M2AP: A minimalist mutual authentication protocol for low-cost RFID tags. In Ubiquitous intelligence and computing (pp. 912–923). Springer, Berlin, Heidelberg. Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagor-da, A. (2006). M2AP: A minimalist mutual authentication protocol for low-cost RFID tags. In Ubiquitous intelligence and computing (pp. 912–923). Springer, Berlin, Heidelberg.
57.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J. C., Estévez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Workshop on RFID security (pp. 12–14). Peris-Lopez, P., Hernandez-Castro, J. C., Estévez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Workshop on RFID security (pp. 12–14).
58.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In On the move to meaningful internet systems 2006: OTM 2006 workshops (pp. 352–361). Springer, Berlin, Heidelberg. Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In On the move to meaningful internet systems 2006: OTM 2006 workshops (pp. 352–361). Springer, Berlin, Heidelberg.
59.
Zurück zum Zitat Tan, C. C., Sheng, B., & Li, Q. (2008). Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 7(4), 1400–1407.MathSciNetCrossRef Tan, C. C., Sheng, B., & Li, Q. (2008). Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 7(4), 1400–1407.MathSciNetCrossRef
60.
Zurück zum Zitat He, L., Jin, S. H., Zhang, T., & Li, N. N. (2009). An enhanced 2-pass optimistic anonymous RFID authentication protocol with forward security. In 5th International conference on wireless communications, networking and mobile computing (pp. 1–4). IEEE. He, L., Jin, S. H., Zhang, T., & Li, N. N. (2009). An enhanced 2-pass optimistic anonymous RFID authentication protocol with forward security. In 5th International conference on wireless communications, networking and mobile computing (pp. 1–4). IEEE.
61.
Zurück zum Zitat Rahman, M. S., Soshi, M., & Miyaji, A. (2009). A secure RFID authentication protocol with low communication cost. In International conference on complex, intelligent and software intensive systems, 2009, CISIS’09 (pp. 559–564). IEEE. Rahman, M. S., Soshi, M., & Miyaji, A. (2009). A secure RFID authentication protocol with low communication cost. In International conference on complex, intelligent and software intensive systems, 2009, CISIS’09 (pp. 559–564). IEEE.
62.
Zurück zum Zitat Li, J., Zhou, Z., & Wang, P. (2017). Cryptanalysis of the LMAP protocol: A low-cost RFID authentication protocol. In 29th Chinese control and decision conference (CCDC) (pp. 7292–7297). IEEE. Li, J., Zhou, Z., & Wang, P. (2017). Cryptanalysis of the LMAP protocol: A low-cost RFID authentication protocol. In 29th Chinese control and decision conference (CCDC) (pp. 7292–7297). IEEE.
63.
Zurück zum Zitat Zhu, S., Yang, B., & Zhang, M. (2007). Research on RFID protocols and security. In Information security and confidentiality of communications (pp. 168–170). Zhu, S., Yang, B., & Zhang, M. (2007). Research on RFID protocols and security. In Information security and confidentiality of communications (pp. 168–170).
64.
Zurück zum Zitat Mujahid, U., Najam-ul-Islam, M., & Shami, M. A. (2015). RCIA: A new ultralightweight rfid authentication protocol using recursive hash. International Journal of Distributed Sensor Networks, 11(1), Article ID 642180. Mujahid, U., Najam-ul-Islam, M., & Shami, M. A. (2015). RCIA: A new ultralightweight rfid authentication protocol using recursive hash. International Journal of Distributed Sensor Networks, 11(1), Article ID 642180.
65.
Zurück zum Zitat Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers & Mathematics with Applications, 69(1), 58–65.MATHCrossRef Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers & Mathematics with Applications, 69(1), 58–65.MATHCrossRef
66.
Zurück zum Zitat Jeon, I. S., & Yoon, E. J. (2013). A new ultralightweight RFID authentication protocol using merge and separation operations. International Journal of Mathematical Analysis, 7(52), 2583–2593.CrossRef Jeon, I. S., & Yoon, E. J. (2013). A new ultralightweight RFID authentication protocol using merge and separation operations. International Journal of Mathematical Analysis, 7(52), 2583–2593.CrossRef
67.
Zurück zum Zitat Kardaş, S., Çelik, S., Arslan, A., & Levi, A. (2013). An efficient and private RFID authentication protocol supporting ownership transfer. In Lightweight cryptography for security and privacy (pp. 130–141). Springer, Berlin, Heidelberg. Kardaş, S., Çelik, S., Arslan, A., & Levi, A. (2013). An efficient and private RFID authentication protocol supporting ownership transfer. In Lightweight cryptography for security and privacy (pp. 130–141). Springer, Berlin, Heidelberg.
68.
Zurück zum Zitat Kardas, S., Levi, A., & Murat, E. (2011). Providing resistance against server information leakage in RFID systems. In 4th IFIP international conference on new technologies, mobility and security (pp. 1–7). IEEE. Kardas, S., Levi, A., & Murat, E. (2011). Providing resistance against server information leakage in RFID systems. In 4th IFIP international conference on new technologies, mobility and security (pp. 1–7). IEEE.
69.
Zurück zum Zitat Fan, K., Li, J., Li, H., Liang, X., Shen, X. S., & Yang, Y. (2014). RSEL: revocable secure efficient lightweight RFID authentication scheme. Concurrency and Computation: Practice and Experience, 26(5), 1084–1096.CrossRef Fan, K., Li, J., Li, H., Liang, X., Shen, X. S., & Yang, Y. (2014). RSEL: revocable secure efficient lightweight RFID authentication scheme. Concurrency and Computation: Practice and Experience, 26(5), 1084–1096.CrossRef
70.
Zurück zum Zitat Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on Computer and Communications Security (pp. 210–219). ACM. Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on Computer and Communications Security (pp. 210–219). ACM.
71.
Zurück zum Zitat Sarma, S. E., Weis, S. A., & Engels, D. W. (2003). RFID systems and security and privacy implications. In Cryptographic hardware and embedded systems CHES 2002 (pp. 454–469). Springer, Berlin, Heidelberg. Sarma, S. E., Weis, S. A., & Engels, D. W. (2003). RFID systems and security and privacy implications. In Cryptographic hardware and embedded systems CHES 2002 (pp. 454–469). Springer, Berlin, Heidelberg.
72.
Zurück zum Zitat Ohkubo, M., Suzuki, K., & Kinoshita, S. (2004). Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In Proceedings of the SCIS (Vol. 2004, pp. 719–724). Ohkubo, M., Suzuki, K., & Kinoshita, S. (2004). Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In Proceedings of the SCIS (Vol. 2004, pp. 719–724).
73.
Zurück zum Zitat Henrici, D., & Muller, P. (2004). Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers. In Proceedings of the second IEEE annual conference on pervasive computing and communications workshops (pp. 149–153). IEEE. Henrici, D., & Muller, P. (2004). Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers. In Proceedings of the second IEEE annual conference on pervasive computing and communications workshops (pp. 149–153). IEEE.
74.
Zurück zum Zitat Gao, X., Xiang, Z., Wang, H., Shen, J., Huang, J., & Song, S. (2004). An approach to security and privacy of RFID system for supply chain. In IEEE international conference on e-commerce technology for dynamic e-business (pp. 164–168). IEEE. Gao, X., Xiang, Z., Wang, H., Shen, J., Huang, J., & Song, S. (2004). An approach to security and privacy of RFID system for supply chain. In IEEE international conference on e-commerce technology for dynamic e-business (pp. 164–168). IEEE.
75.
Zurück zum Zitat Li, Y., & Ding, X. (2007). Protecting RFID communications in supply chains. In Proceedings of the 2nd ACM symposium on information, computer and communications security (pp. 234–241). ACM. Li, Y., & Ding, X. (2007). Protecting RFID communications in supply chains. In Proceedings of the 2nd ACM symposium on information, computer and communications security (pp. 234–241). ACM.
76.
Zurück zum Zitat Ren, X., Xu, X., & Li, Y. (2013). An one-way hash function based lightweight mutual authentication rfid protocol. Journal of Computers, 8(9), 2405–2412.CrossRef Ren, X., Xu, X., & Li, Y. (2013). An one-way hash function based lightweight mutual authentication rfid protocol. Journal of Computers, 8(9), 2405–2412.CrossRef
77.
Zurück zum Zitat Song, B., & Mitchell, C. J. (2008). RFID authentication protocol for low-cost tags. In Proceedings of the first ACM conference on wireless network security (pp. 140–147). ACM. Song, B., & Mitchell, C. J. (2008). RFID authentication protocol for low-cost tags. In Proceedings of the first ACM conference on wireless network security (pp. 140–147). ACM.
78.
Zurück zum Zitat Ning, H., Liu, H., Mao, J., & Zhang, Y. (2011). Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Communications, 5(12), 1755–1768.MathSciNetCrossRef Ning, H., Liu, H., Mao, J., & Zhang, Y. (2011). Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Communications, 5(12), 1755–1768.MathSciNetCrossRef
79.
Zurück zum Zitat Maarof, A., Labbi, Z., Senhadji, M., & Belkasmi, M. (2016). A novel mutual authentication scheme for low-cost RFID systems. In 2016 international conference on wireless networks and mobile communications (WINCOM) (pp. 240–245). IEEE. Maarof, A., Labbi, Z., Senhadji, M., & Belkasmi, M. (2016). A novel mutual authentication scheme for low-cost RFID systems. In 2016 international conference on wireless networks and mobile communications (WINCOM) (pp. 240–245). IEEE.
80.
Zurück zum Zitat Huang, Y. C., & Jiang, J. R. (2012). An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags. In 2012 fifth international symposium on parallel architectures, algorithms and programming (PAAP) (pp. 133–140). IEEE. Huang, Y. C., & Jiang, J. R. (2012). An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags. In 2012 fifth international symposium on parallel architectures, algorithms and programming (PAAP) (pp. 133–140). IEEE.
81.
Zurück zum Zitat Zhang, W., Liu, S., Wang, S., Yi, B., & Wu, L. (2017). An efficient lightweight RFID authentication protocol with strong trajectory privacy protection. Wireless Personal Communications, 96(1), 1215–1228.CrossRef Zhang, W., Liu, S., Wang, S., Yi, B., & Wu, L. (2017). An efficient lightweight RFID authentication protocol with strong trajectory privacy protection. Wireless Personal Communications, 96(1), 1215–1228.CrossRef
82.
Zurück zum Zitat Zhang, W., Wu, L., Liu, S., Huang, T., Guo, Y., & Hsu, C. (2016). A trajectory privacy model for radio-frequency identification system. Wireless Personal Communications, 90(3), 1121–1134.CrossRef Zhang, W., Wu, L., Liu, S., Huang, T., Guo, Y., & Hsu, C. (2016). A trajectory privacy model for radio-frequency identification system. Wireless Personal Communications, 90(3), 1121–1134.CrossRef
83.
Zurück zum Zitat Habibi, M. H., Alagheband, M. R., & Aref, M. R. (2011). Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard. In Information security theory and practice. Security and privacy of mobile devices in wireless communication (pp. 254–263). Springer, Berlin, Heidelberg. Habibi, M. H., Alagheband, M. R., & Aref, M. R. (2011). Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard. In Information security theory and practice. Security and privacy of mobile devices in wireless communication (pp. 254–263). Springer, Berlin, Heidelberg.
84.
Zurück zum Zitat Xiao, F., Zhou, Y. J., Zhou, J. X., & Niu, X. X. (2013). Provable secure mutual authentication protocol for RFID in the standard model. Journal on Communications, 34(4), 82–87. Xiao, F., Zhou, Y. J., Zhou, J. X., & Niu, X. X. (2013). Provable secure mutual authentication protocol for RFID in the standard model. Journal on Communications, 34(4), 82–87.
85.
Zurück zum Zitat Ha, J. C., Ha, J. H., Moon, S. J., & Boyd, C. (2006). LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID system. In International conference on ubiquitous convergence technology (Vol. 4412, pp. 80–89). Springer. Ha, J. C., Ha, J. H., Moon, S. J., & Boyd, C. (2006). LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID system. In International conference on ubiquitous convergence technology (Vol. 4412, pp. 80–89). Springer.
86.
Zurück zum Zitat Alomair, B., Clark, A., Cuellar, J., & Poovendran, R. (2012). Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Transactions on Parallel and Distributed Systems, 23(8), 1536–1550.CrossRef Alomair, B., Clark, A., Cuellar, J., & Poovendran, R. (2012). Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Transactions on Parallel and Distributed Systems, 23(8), 1536–1550.CrossRef
87.
Zurück zum Zitat Pang, L., Li, H., He, L., Alramadhan, A., & Wang, Y. (2014). Secure and efficient lightweight RFID authentication protocol based on fast tag indexing. International Journal of Communication Systems, 27(11), 3244–3254. Pang, L., Li, H., He, L., Alramadhan, A., & Wang, Y. (2014). Secure and efficient lightweight RFID authentication protocol based on fast tag indexing. International Journal of Communication Systems, 27(11), 3244–3254.
88.
Zurück zum Zitat Zhang, Z., Zhou, S., & Luo, Z. (2008). Design and analysis for RFID authentication protocol. In IEEE international conference on e-business engineering (pp. 574–577). IEEE. Zhang, Z., Zhou, S., & Luo, Z. (2008). Design and analysis for RFID authentication protocol. In IEEE international conference on e-business engineering (pp. 574–577). IEEE.
89.
Zurück zum Zitat Zhou, S., Zhang, Z., Luo, Z., & Wong, E. C. (2010). A lightweight anti desynchronization RFID authentication protocol. Information Systems Frontiers, 12(5), 521–528.CrossRef Zhou, S., Zhang, Z., Luo, Z., & Wong, E. C. (2010). A lightweight anti desynchronization RFID authentication protocol. Information Systems Frontiers, 12(5), 521–528.CrossRef
90.
Zurück zum Zitat Choi, E. Y., Lee, S. M., & Lee, D. H. (2005). Efficient RFID authentication protocol for ubiquitous computing environment. In Embedded and ubiquitous computing–EUC 2005 workshops (pp. 945–954). Springer, Berlin, Heidelberg. Choi, E. Y., Lee, S. M., & Lee, D. H. (2005). Efficient RFID authentication protocol for ubiquitous computing environment. In Embedded and ubiquitous computingEUC 2005 workshops (pp. 945–954). Springer, Berlin, Heidelberg.
91.
Zurück zum Zitat Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. In First international conference on security and privacy for emerging areas in communications networks (pp. 59–66). IEEE. Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. In First international conference on security and privacy for emerging areas in communications networks (pp. 59–66). IEEE.
92.
Zurück zum Zitat Lin, Z., & Song, J. S. (2013). An improvement in HB-family lightweight authentication protocols for practical use of RFID system. Journal of Advances in Computer Networks, 1(1), 61–65.MathSciNetCrossRef Lin, Z., & Song, J. S. (2013). An improvement in HB-family lightweight authentication protocols for practical use of RFID system. Journal of Advances in Computer Networks, 1(1), 61–65.MathSciNetCrossRef
93.
Zurück zum Zitat Juels, A., & Weis, S. A. (2005). Authenticating pervasive devices with human protocols. In Advances in cryptology–CRYPTO 2005 (pp. 293–308). Springer, Berlin, Heidelberg. Juels, A., & Weis, S. A. (2005). Authenticating pervasive devices with human protocols. In Advances in cryptologyCRYPTO 2005 (pp. 293–308). Springer, Berlin, Heidelberg.
94.
Zurück zum Zitat Hopper, N. J., & Blum, M. (2001). Secure human identification protocols. In Advances in cryptology—ASIACRYPT 2001 (pp. 52–66). Springer, Berlin, Heidelberg. Hopper, N. J., & Blum, M. (2001). Secure human identification protocols. In Advances in cryptologyASIACRYPT 2001 (pp. 52–66). Springer, Berlin, Heidelberg.
95.
Zurück zum Zitat Munilla, J., & Peinado, A. (2007). HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks, 51(9), 2262–2267.MATHCrossRef Munilla, J., & Peinado, A. (2007). HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks, 51(9), 2262–2267.MATHCrossRef
96.
Zurück zum Zitat Leng, X., Mayes, K., & Markantonakis, K. (2008). HB-MP+ protocol: An improvement on the HB-MP protocol. In 2008 IEEE international conference on RFID (pp. 118–124). IEEE. Leng, X., Mayes, K., & Markantonakis, K. (2008). HB-MP+ protocol: An improvement on the HB-MP protocol. In 2008 IEEE international conference on RFID (pp. 118–124). IEEE.
97.
Zurück zum Zitat Tounsi, W., Cuppens-Boulahia, N., Garcia-Alfaro, J., Chevalier, Y., & Cuppens, F. (2014). KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications, 39, 152–166.MATHCrossRef Tounsi, W., Cuppens-Boulahia, N., Garcia-Alfaro, J., Chevalier, Y., & Cuppens, F. (2014). KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications, 39, 152–166.MATHCrossRef
98.
Zurück zum Zitat Van Le, T., Burmester, M., & De Medeiros, B. (2007). Universally composable and forward secure RFID authentication and authenticated key exchange. In Proceedings of the 2nd ACM symposium on information, computer and communications security (pp. 242–252). ACM. Van Le, T., Burmester, M., & De Medeiros, B. (2007). Universally composable and forward secure RFID authentication and authenticated key exchange. In Proceedings of the 2nd ACM symposium on information, computer and communications security (pp. 242–252). ACM.
99.
Zurück zum Zitat Burmester, M., & Munilla, J. (2011). Lightweight RFID authentication with forward and backward security. ACM Transactions on Information and System Security (TISSEC), 14(1), 11–16.CrossRef Burmester, M., & Munilla, J. (2011). Lightweight RFID authentication with forward and backward security. ACM Transactions on Information and System Security (TISSEC), 14(1), 11–16.CrossRef
100.
Zurück zum Zitat HanataniI, Y., Ohkubo, M., Matsuo, S. I., Sakiyama, K., & Ohta, K. (2012). A study on computational formal verification for practical cryptographic protocol: The case of synchronous RFID authentication. In Financial cryptography and data security (pp. 70–87). Springer, Berlin, Heidelberg. HanataniI, Y., Ohkubo, M., Matsuo, S. I., Sakiyama, K., & Ohta, K. (2012). A study on computational formal verification for practical cryptographic protocol: The case of synchronous RFID authentication. In Financial cryptography and data security (pp. 70–87). Springer, Berlin, Heidelberg.
101.
Zurück zum Zitat Brusó, M., Chatzikokolakis, K., & Den Hartog, J. (2010). Formal verification of privacy for RFID systems. In 23rd IEEE computer security foundations symposium (pp. 75–88). IEEE. Brusó, M., Chatzikokolakis, K., & Den Hartog, J. (2010). Formal verification of privacy for RFID systems. In 23rd IEEE computer security foundations symposium (pp. 75–88). IEEE.
102.
Zurück zum Zitat Kim, H. S., Oh, J. H., Kim, J. B., Jeong, Y. O., & Choi, J. Y. (2008). Formal verification of cryptographic protocol for secure RFID system. In Fourth international conference on networked computing and advanced information management (Vol. 2, pp. 470–477). IEEE. Kim, H. S., Oh, J. H., Kim, J. B., Jeong, Y. O., & Choi, J. Y. (2008). Formal verification of cryptographic protocol for secure RFID system. In Fourth international conference on networked computing and advanced information management (Vol. 2, pp. 470–477). IEEE.
103.
Zurück zum Zitat Asadpour, M., & Dashti, M. T. (2011). A privacy-friendly RFID protocol using reusable anonymous tickets. In IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 206–213). IEEE. Asadpour, M., & Dashti, M. T. (2011). A privacy-friendly RFID protocol using reusable anonymous tickets. In IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 206–213). IEEE.
104.
Zurück zum Zitat Gao, L., Ma, M., Shu, Y., & Wei, Y. (2014). An ultralightweight RFID authentication protocol with CRC and permutation. Journal of Network and Computer Applications, 41, 37–46.CrossRef Gao, L., Ma, M., Shu, Y., & Wei, Y. (2014). An ultralightweight RFID authentication protocol with CRC and permutation. Journal of Network and Computer Applications, 41, 37–46.CrossRef
105.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M., & Ribagorda, A. (2009). Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In Information security applications (pp. 56–68). Springer, Berlin, Heidelberg. Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M., & Ribagorda, A. (2009). Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In Information security applications (pp. 56–68). Springer, Berlin, Heidelberg.
106.
Zurück zum Zitat Luo, H., Wen, G., Su, J., & Huang, Z. (2016). SLAP: Succinct and lightweight authentication protocol for low-cost RFID system. Wireless Networks, 22, 1–10.CrossRef Luo, H., Wen, G., Su, J., & Huang, Z. (2016). SLAP: Succinct and lightweight authentication protocol for low-cost RFID system. Wireless Networks, 22, 1–10.CrossRef
107.
Zurück zum Zitat Zhuang, X., Zhu, Y., & Chang, C. C. (2014). A new ultralightweight RFID protocol for low-cost tags: R2AP. Wireless Personal Communications, 79(3), 1787–1802.CrossRef Zhuang, X., Zhu, Y., & Chang, C. C. (2014). A new ultralightweight RFID protocol for low-cost tags: R2AP. Wireless Personal Communications, 79(3), 1787–1802.CrossRef
108.
Zurück zum Zitat Tewari, A., & Gupta, B. B. (2017). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing, 73(3), 1085–1102.CrossRef Tewari, A., & Gupta, B. B. (2017). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing, 73(3), 1085–1102.CrossRef
109.
Zurück zum Zitat Kardaş, S., Çelik, S., Bingöl, M. A., Kiraz, M. S., Demirci, H., & Levi, A. (2015). K-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions. Wireless Communications and Mobile Computing, 15(18), 2150–2166.CrossRef Kardaş, S., Çelik, S., Bingöl, M. A., Kiraz, M. S., Demirci, H., & Levi, A. (2015). K-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions. Wireless Communications and Mobile Computing, 15(18), 2150–2166.CrossRef
110.
Zurück zum Zitat Ranasinghe, D., Engels, D., & Cole, P. (2004). Security and privacy: Modest proposals for low-cost RFID systems. In Auto-ID labs research workshop, Zurich, Switzerland. Ranasinghe, D., Engels, D., & Cole, P. (2004). Security and privacy: Modest proposals for low-cost RFID systems. In Auto-ID labs research workshop, Zurich, Switzerland.
111.
Zurück zum Zitat Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In Topics in cryptology–CT-RSA 2006 (pp. 115–131). Springer Berlin Heidelberg. Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In Topics in cryptologyCT-RSA 2006 (pp. 115–131). Springer Berlin Heidelberg.
112.
Zurück zum Zitat Bassil, R., El-Beaino, W., Itani, W., Kayssi, A., & Chehab, A. (2012). PUMAP: A PUF-based ultra-lightweight mutual authentication RFID protocol. International Journal of RFID Security and Cryptography, 1(1/2), 58–66. Bassil, R., El-Beaino, W., Itani, W., Kayssi, A., & Chehab, A. (2012). PUMAP: A PUF-based ultra-lightweight mutual authentication RFID protocol. International Journal of RFID Security and Cryptography, 1(1/2), 58–66.
113.
Zurück zum Zitat Chien, H. Y., Yang, C. C., Wu, T. C., & Lee, C. F. (2011). Two RFID-based solutions to enhance inpatient medication safety. Journal of Medical Systems, 35(3), 369–375.CrossRef Chien, H. Y., Yang, C. C., Wu, T. C., & Lee, C. F. (2011). Two RFID-based solutions to enhance inpatient medication safety. Journal of Medical Systems, 35(3), 369–375.CrossRef
114.
Zurück zum Zitat Peris-Lopez, P., Orfila, A., Mitrokotsa, A., & Van der Lubbe, J. C. (2011). A comprehensive RFID solution to enhance inpatient medication safety. International Journal of Medical Informatics, 80(1), 13–24.CrossRef Peris-Lopez, P., Orfila, A., Mitrokotsa, A., & Van der Lubbe, J. C. (2011). A comprehensive RFID solution to enhance inpatient medication safety. International Journal of Medical Informatics, 80(1), 13–24.CrossRef
115.
Zurück zum Zitat Yen, Y. C., Lo, N. W., & Wu, T. C. (2012). Two RFID-based solutions for secure inpatient medication administration. Journal of Medical Systems, 36(5), 2769–2778.CrossRef Yen, Y. C., Lo, N. W., & Wu, T. C. (2012). Two RFID-based solutions for secure inpatient medication administration. Journal of Medical Systems, 36(5), 2769–2778.CrossRef
116.
Zurück zum Zitat Chen, Y. Y., Huang, D. C., Tsai, M. L., & Jan, J. K. (2012). A design of tamper resistant prescription RFID access control system. Journal of Medical Systems, 36(5), 2795–2801.CrossRef Chen, Y. Y., Huang, D. C., Tsai, M. L., & Jan, J. K. (2012). A design of tamper resistant prescription RFID access control system. Journal of Medical Systems, 36(5), 2795–2801.CrossRef
117.
Zurück zum Zitat Kim, H. (2012). Enhanced hash-based RFID mutual authentication protocol. In Computer applications for security, control and system engineering (pp. 70–77). Springer, Berlin, Heidelberg. Kim, H. (2012). Enhanced hash-based RFID mutual authentication protocol. In Computer applications for security, control and system engineering (pp. 70–77). Springer, Berlin, Heidelberg.
118.
Zurück zum Zitat Kim, H. (2013). RFID mutual authentication protocol based on synchronized secret. International Journal of Security and Its Applications, 7(4), 37–50. Kim, H. (2013). RFID mutual authentication protocol based on synchronized secret. International Journal of Security and Its Applications, 7(4), 37–50.
119.
Zurück zum Zitat Safkhani, M., Peris-Lopez, P., Castro, J. C. H., & Bagheri, N. (2014). Cryptanalysis of Cho et al’.s protocol, A hash-based mutual authentication protocol for RFID systems. Journal of Computational and Applied Mathematics, 259, 571–577.MathSciNetMATHCrossRef Safkhani, M., Peris-Lopez, P., Castro, J. C. H., & Bagheri, N. (2014). Cryptanalysis of Cho et al’.s protocol, A hash-based mutual authentication protocol for RFID systems. Journal of Computational and Applied Mathematics, 259, 571–577.MathSciNetMATHCrossRef
120.
Zurück zum Zitat Mohammadi, M., Hosseinzadeh, M., & Esmaeildoust, M. (2014). Analysis and improvement of the lightweight mutual authentication protocol under EPC C-1 G-2 standard. Advances in Computer Science: An International Journal, 3(2), 10–16. Mohammadi, M., Hosseinzadeh, M., & Esmaeildoust, M. (2014). Analysis and improvement of the lightweight mutual authentication protocol under EPC C-1 G-2 standard. Advances in Computer Science: An International Journal, 3(2), 10–16.
121.
Zurück zum Zitat Gilbert, H., Robshaw, M. J., & Seurin, Y. (2008). Good variants of HB+ are hard to find. In Financial cryptography and data security (pp. 156–170). Springer, Berlin, Heidelberg. Gilbert, H., Robshaw, M. J., & Seurin, Y. (2008). Good variants of HB+ are hard to find. In Financial cryptography and data security (pp. 156–170). Springer, Berlin, Heidelberg.
122.
Zurück zum Zitat Gilbert, H., Robshaw, M. J., & Seurin, Y. (2008).: HB#: Increasing the security and efficiency of HB+. In Advances in cryptology–EUROCRYPT 2008 (pp. 361–378). Springer, Berlin, Heidelberg. Gilbert, H., Robshaw, M. J., & Seurin, Y. (2008).: HB#: Increasing the security and efficiency of HB+. In Advances in cryptologyEUROCRYPT 2008 (pp. 361–378). Springer, Berlin, Heidelberg.
123.
Zurück zum Zitat Yoon, B., Sung, M. Y., Yeon, S., & Oh, H. S. (2009). HB-MP++ protocol: An ultralightweight authentication protocol for RFID system. In Proceedings of IEEE international conference on RFID (pp. 186–191). IEEE. Yoon, B., Sung, M. Y., Yeon, S., & Oh, H. S. (2009). HB-MP++ protocol: An ultralightweight authentication protocol for RFID system. In Proceedings of IEEE international conference on RFID (pp. 186–191). IEEE.
124.
Zurück zum Zitat Ouafi, K., Overbeck, R., & Vaudenay, S. (2008). On the security of HB# against a man-in-the-middle attack. In Advances in cryptology-ASIACRYPT 2008 (pp. 108–124). Springer, Berlin, Heidelberg. Ouafi, K., Overbeck, R., & Vaudenay, S. (2008). On the security of HB# against a man-in-the-middle attack. In Advances in cryptology-ASIACRYPT 2008 (pp. 108–124). Springer, Berlin, Heidelberg.
125.
Zurück zum Zitat Halevi, T., Saxena, N., & Halevi, S. (2011). Tree-based HB protocols for privacy-preserving authentication of RFID tags. Journal of Computer Security, 19(2), 343–363.CrossRef Halevi, T., Saxena, N., & Halevi, S. (2011). Tree-based HB protocols for privacy-preserving authentication of RFID tags. Journal of Computer Security, 19(2), 343–363.CrossRef
126.
Zurück zum Zitat Rizomiliotis, P., & Gritzalis, S. (2012). GHB#: A provably secure HB-like lightweight authentication protocol. In Applied cryptography and network security (pp. 489–506). Springer, Berlin, Heidelberg. Rizomiliotis, P., & Gritzalis, S. (2012). GHB#: A provably secure HB-like lightweight authentication protocol. In Applied cryptography and network security (pp. 489–506). Springer, Berlin, Heidelberg.
127.
Zurück zum Zitat Deng, G., Li, H., Zhang, Y., & Wang, J. (2013). Tree-LSHB+: An LPN-based lightweight mutual authentication RFID protocol. Wireless Personal Communications, 72(1), 159–174.CrossRef Deng, G., Li, H., Zhang, Y., & Wang, J. (2013). Tree-LSHB+: An LPN-based lightweight mutual authentication RFID protocol. Wireless Personal Communications, 72(1), 159–174.CrossRef
128.
Zurück zum Zitat Qian, X., Liu, X., Yang, S., & Zuo, C. (2014). Security and privacy analysis of tree-LSHB+ protocol. Wireless Personal Communications, 77(4), 3125–3141.CrossRef Qian, X., Liu, X., Yang, S., & Zuo, C. (2014). Security and privacy analysis of tree-LSHB+ protocol. Wireless Personal Communications, 77(4), 3125–3141.CrossRef
129.
Zurück zum Zitat Juels, A. (2005). Strengthening EPC tags against cloning. In Proceedings of the 4th ACM workshop on wireless security (pp. 67–76). ACM. Juels, A. (2005). Strengthening EPC tags against cloning. In Proceedings of the 4th ACM workshop on wireless security (pp. 67–76). ACM.
130.
Zurück zum Zitat Karthikeyan, S., & Nesterenko, M. (2005). RFID security without extensive cryptography. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (pp. 63–67). ACM. Karthikeyan, S., & Nesterenko, M. (2005). RFID security without extensive cryptography. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (pp. 63–67). ACM.
131.
Zurück zum Zitat Lo, N. W., & Yeh, K. H. (2007). An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system. In Emerging directions in embedded and ubiquitous computing (pp. 43–56). Springer, Berlin, Heidelberg. Lo, N. W., & Yeh, K. H. (2007). An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system. In Emerging directions in embedded and ubiquitous computing (pp. 43–56). Springer, Berlin, Heidelberg.
132.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2009). Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards & Interfaces, 31(2), 372–380.CrossRef Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2009). Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards & Interfaces, 31(2), 372–380.CrossRef
133.
Zurück zum Zitat Yeh, T. C., Wang, Y. J., Kuo, T. C., & Wang, S. S. (2010). Securing RFID systems conforming to EPC Class 1 Generation 2 standard. Expert Systems with Applications, 37(12), 7678–7683.CrossRef Yeh, T. C., Wang, Y. J., Kuo, T. C., & Wang, S. S. (2010). Securing RFID systems conforming to EPC Class 1 Generation 2 standard. Expert Systems with Applications, 37(12), 7678–7683.CrossRef
134.
Zurück zum Zitat Habibi, M. H., Gardeshi, M., & Alaghband, M. R. (2011). Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard. arXiv preprint arXiv:1102.0763. Habibi, M. H., Gardeshi, M., & Alaghband, M. R. (2011). Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard. arXiv preprint arXiv:​1102.​0763.
135.
Zurück zum Zitat Alavi, S. M., Baghery, K., & Abdolmaleki, B. (2014). Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags. Advances in Computer Science: an International Journal (ACSIJ), 3(5), 44–52. Alavi, S. M., Baghery, K., & Abdolmaleki, B. (2014). Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags. Advances in Computer Science: an International Journal (ACSIJ), 3(5), 44–52.
136.
Zurück zum Zitat Pang, L., He, L., Pei, Q., & Wang, Y. (2013). Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard. In 2013 IEEE Wireless communications and networking conference (WCNC) (pp. 1870–1875). IEEE. Pang, L., He, L., Pei, Q., & Wang, Y. (2013). Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard. In 2013 IEEE Wireless communications and networking conference (WCNC) (pp. 1870–1875). IEEE.
137.
Zurück zum Zitat Wang, S., Liu, S., & Chen, D. (2015). Security analysis and improvement on two RFID authentication protocols. Wireless Personal Communications, 82(1), 21–33.CrossRef Wang, S., Liu, S., & Chen, D. (2015). Security analysis and improvement on two RFID authentication protocols. Wireless Personal Communications, 82(1), 21–33.CrossRef
138.
Zurück zum Zitat Phan, R. C. W. (2009). Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Transactions on Dependable and Secure Computing, 6(4), 316–320.CrossRef Phan, R. C. W. (2009). Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Transactions on Dependable and Secure Computing, 6(4), 316–320.CrossRef
139.
Zurück zum Zitat Hernandez-Castro, J. C., Tapiador, J. M., Peris-Lopez, P., & Quisquater, J. J. (2009). Cryptanalysis of the SASI ultralightweight RFID authentication protocol with modular rotations. In International workshop on coding and cryptography. Hernandez-Castro, J. C., Tapiador, J. M., Peris-Lopez, P., & Quisquater, J. J. (2009). Cryptanalysis of the SASI ultralightweight RFID authentication protocol with modular rotations. In International workshop on coding and cryptography.
140.
Zurück zum Zitat Tagra, D., Rahman, M., & Sampalli, S. (2010). Flaws in a recent ultralightweight RFID protocol. In International conference on software telecommunications and computer networks, Croatia (pp. 6–10). Tagra, D., Rahman, M., & Sampalli, S. (2010). Flaws in a recent ultralightweight RFID protocol. In International conference on software telecommunications and computer networks, Croatia (pp. 6–10).
141.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., & Ribagorda, A. (2009). An ultra-light authentication protocol resistant to passive attacks under the Gen-2 specification. Journal of Information Science and Engineering, 25(1), 33–57. Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., & Ribagorda, A. (2009). An ultra-light authentication protocol resistant to passive attacks under the Gen-2 specification. Journal of Information Science and Engineering, 25(1), 33–57.
142.
Zurück zum Zitat Wang, S. H., & Wang, G. L. (2010). Analysis of passive attack on RFID authentication protocol ULAP. Networks and Communications, 36, 17–19. Wang, S. H., & Wang, G. L. (2010). Analysis of passive attack on RFID authentication protocol ULAP. Networks and Communications, 36, 17–19.
143.
Zurück zum Zitat Zhuang, X., Wang, Z. H., Chang, C. C., & Zhu, Y. (2013). Security analysis of a new ultralightweight RFID protocol and its improvement. Journal of Information Hiding and Multimedia Signal Processing, 4(3), 165–180. Zhuang, X., Wang, Z. H., Chang, C. C., & Zhu, Y. (2013). Security analysis of a new ultralightweight RFID protocol and its improvement. Journal of Information Hiding and Multimedia Signal Processing, 4(3), 165–180.
144.
Zurück zum Zitat Jeon, I. S., & Yoon, E. J. (2013). Cryptanalysis and improvement of a new ultralightweight rfid authentication protocol with permutation. Applied Mathematical Sciences, 7, 3433–3444.CrossRef Jeon, I. S., & Yoon, E. J. (2013). Cryptanalysis and improvement of a new ultralightweight rfid authentication protocol with permutation. Applied Mathematical Sciences, 7, 3433–3444.CrossRef
145.
Zurück zum Zitat Zhuang, X., Zhu, Y., & Chang, C.C. (2013). Security analysis of ultralightweight RFID protocols. Technique Report. Zhuang, X., Zhu, Y., & Chang, C.C. (2013). Security analysis of ultralightweight RFID protocols. Technique Report.
146.
Zurück zum Zitat Avoine, G., & Oechslin, P. (2005). A scalable and provably secure hash-based RFID protocol. In Proceedings of the third IEEE international conference on pervasive computing and communications workshops (pp. 110–114). IEEE. Avoine, G., & Oechslin, P. (2005). A scalable and provably secure hash-based RFID protocol. In Proceedings of the third IEEE international conference on pervasive computing and communications workshops (pp. 110–114). IEEE.
147.
Zurück zum Zitat Henrici, D., & Müller, P. (2008). Providing security and privacy in RFID systems using triggered hash chains. In Proceedings of the sixth annual IEEE international conference on pervasive computing and communications (pp. 50–59). IEEE. Henrici, D., & Müller, P. (2008). Providing security and privacy in RFID systems using triggered hash chains. In Proceedings of the sixth annual IEEE international conference on pervasive computing and communications (pp. 50–59). IEEE.
148.
Zurück zum Zitat Molnar, D., Soppera, A., & Wagner, D. (2005). A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In International workshop on selected areas in cryptography (pp. 276–290). Springer, Berlin, Heidelberg. Molnar, D., Soppera, A., & Wagner, D. (2005). A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In International workshop on selected areas in cryptography (pp. 276–290). Springer, Berlin, Heidelberg.
149.
Zurück zum Zitat Dimitriou, T. (2006). A secure and efficient RFID protocol that could make big brother (partially) obsolete. In Fourth annual ieee international conference on pervasive computing and communications (pp. 6). IEEE. Dimitriou, T. (2006). A secure and efficient RFID protocol that could make big brother (partially) obsolete. In Fourth annual ieee international conference on pervasive computing and communications (pp. 6). IEEE.
150.
Zurück zum Zitat Avoine, G., Coisel, I., & Martin, T. (2010). Time measurement threatens privacy-friendly RFID authentication protocols. In International workshop on radio frequency identification: Security and privacy issues (pp. 138–157). Springer, Berlin, Heidelberg. Avoine, G., Coisel, I., & Martin, T. (2010). Time measurement threatens privacy-friendly RFID authentication protocols. In International workshop on radio frequency identification: Security and privacy issues (pp. 138–157). Springer, Berlin, Heidelberg.
151.
Zurück zum Zitat Figueiredo, R., Zúquete, A., & e Silva, T. O. (2014). Massively parallel identification of privacy-preserving vehicle RFID tags. In International workshop on radio frequency identification: Security and privacy issues (pp. 36–53). Springer International Publishing. Figueiredo, R., Zúquete, A., & e Silva, T. O. (2014). Massively parallel identification of privacy-preserving vehicle RFID tags. In International workshop on radio frequency identification: Security and privacy issues (pp. 36–53). Springer International Publishing.
152.
Zurück zum Zitat Rohr, A., Nohl, K., & Plötz, H. (2010). Establishing Security Best Practices in Access Control. Berlin, Germany: Security Research Labs. Rohr, A., Nohl, K., & Plötz, H. (2010). Establishing Security Best Practices in Access Control. Berlin, Germany: Security Research Labs.
153.
Zurück zum Zitat Kumar, V. N., & Srinivasan, B. (2012). Evolution of electronic passport scheme using cryptographic protocol along with biometrics authentication system. International Journal of Computer Network and Information Security, 4(2), 50.CrossRef Kumar, V. N., & Srinivasan, B. (2012). Evolution of electronic passport scheme using cryptographic protocol along with biometrics authentication system. International Journal of Computer Network and Information Security, 4(2), 50.CrossRef
154.
Zurück zum Zitat Hwang, R. J., Su, F. F., & Tsai, Y. C. (2010). Efficient electronic toll collection protocol for intelligent transport system. Journal of Computer Science, 21(3), 18–26. Hwang, R. J., Su, F. F., & Tsai, Y. C. (2010). Efficient electronic toll collection protocol for intelligent transport system. Journal of Computer Science, 21(3), 18–26.
155.
Zurück zum Zitat Nair, L. S., Arun, V. S., & Joseph, S. (2015). Secure e-ticketing system based on mutual authentication using RFID. In Proceedings of the third international symposium on women in computing and informatics (pp. 673–677). ACM. Nair, L. S., Arun, V. S., & Joseph, S. (2015). Secure e-ticketing system based on mutual authentication using RFID. In Proceedings of the third international symposium on women in computing and informatics (pp. 673–677). ACM.
157.
Zurück zum Zitat Schalk, G. H. (2013). RFID: MIFARE and contactless cards in application. Limbricht: Elektor Publishing. Schalk, G. H. (2013). RFID: MIFARE and contactless cards in application. Limbricht: Elektor Publishing.
Metadaten
Titel
Review of different classes of RFID authentication protocols
verfasst von
Alaauldin Ibrahim
Gokhan Dalkılıc
Publikationsdatum
30.12.2017
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 3/2019
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1638-3

Weitere Artikel der Ausgabe 3/2019

Wireless Networks 3/2019 Zur Ausgabe

Neuer Inhalt