5G-Compliant Authentication Protocol for RFID
نویسندگان
چکیده
منابع مشابه
A Flyweight RFID Authentication Protocol
We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudo-random number generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG. The protocol is optimistic with constant lookup time, and can be easily a...
متن کاملRFID Authentication Protocol: A Review
RFID (Radio Frequency Identification) is recently becoming popular due to its convenience and economical efficiency. Furthermore, RFID nowadays comes into the spotlight as a technology to substitute the barcode. On the other hand, RFID is jeopardized from various attacks and problems as an obstacle of widespread RFID deployment: replay, spoofing, traceability, de-synchronization, un-scalability...
متن کاملA Hybrid Mutual Authentication Protocol for RFID
Out of the large number of RFID security protocols proposed in recent years none have proven to be truly secure and the creation of a truly secure security protocol for systems employing low cost RFID tags remains an open problem. In this paper we develop and present a RFID security protocol which not only allows mutual authentication and secure transmission of data between the reader and tag b...
متن کاملMutual Authentication Protocol for Low-cost RFID
Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a ubiquitous infrastructure. However, current low-cost RFID tags are highly resource-constrained and cannot support its long-term security, so they have potential risks and may violate privacy for their bearers. To remove security vulnerabilities, we propose a robust mutual auth...
متن کاملCryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This protocol is an improvement to a protocol proposed by Chen and Deng which has been cryptanalysed by Peris et al. and Kapoor and Piramuthu. However, our security analysis clearly shows that the designers were not successful in th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2020
ISSN: 2079-9292
DOI: 10.3390/electronics9111951