Secure RFID authentication schemes based on security analysis and improvements of the USI protocol
Wireless radio frequency identification (RFID) has been widely used as the core technology of the Internet of Things, but it also brings many potential security risks. In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols hav...
Saved in:
Main Authors: | Gao, Lijun, Zhang, Lu, Lin, Feng, Ma, Maode |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/105994 http://hdl.handle.net/10220/48844 http://dx.doi.org/10.1109/ACCESS.2018.2890282 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
The Security and Improvement of An Ultra-Lightweight RFID Authentication Protocol
by: LI, Tieyan, et al.
Published: (2008) -
RFID mutual authentication protocols with universally composable security
by: SU, Chunhua, et al.
Published: (2011) -
Security analysis on a family of ultra-lightweight RFID authentication protocols
by: LI, Tieyan, et al.
Published: (2008) -
Security and Performance Analysis for RFID Protocols
by: LIANG, Bing
Published: (2010) -
A Security and Performance Evaluation of Hash-Based Rfid Protocols
by: Lim, Tong-Lee, et al.
Published: (2008)