Using dummy data for RFID tag and reader authentication
Radio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags. In this paper, we propose an authentication protocol based on moni...
Main Authors: | Baha’ A. Alsaify, Dale R. Thompson, Abdallah Alma'aitah, Jia Di |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2022-10-01
|
Series: | Digital Communications and Networks |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2352864821000687 |
Similar Items
-
Reader–Tag Commands via Modulation Cutoff Intervals in RFID Systems
by: Abdallah Y. Alma’aitah, et al.
Published: (2021-09-01) -
Safety for Low-Cost RFID Tags Using Lightweight Authentication Protocol
by: A. V. Starikovskiy, et al.
Published: (2010-06-01) -
Survey on Prominent RFID Authentication Protocols for Passive Tags
by: Rania Baashirah, et al.
Published: (2018-10-01) -
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
by: Ferucio Laurentiu Tiplea, et al.
Published: (2022-12-01) -
RFID Mutual Authentication Protocols based on Gene Mutation and Transfer
by: Raghav V. Sampangi, et al.
Published: (2013-03-01)