Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol

Wireless radio frequency identification (RFID) has been widely used as the core technology of the Internet of Things, but it also brings many potential security risks. In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols hav...

Full description

Bibliographic Details
Main Authors: Lijun Gao, Lu Zhang, Feng Lin, Maode Ma
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8598704/