Secure RFID authentication schemes based on security analysis and improvements of the USI protocol
Wireless radio frequency identification (RFID) has been widely used as the core technology of the Internet of Things, but it also brings many potential security risks. In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols hav...
Main Authors: | Gao, Lijun, Zhang, Lu, Lin, Feng, Ma, Maode |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Journal Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/105994 http://hdl.handle.net/10220/48844 http://dx.doi.org/10.1109/ACCESS.2018.2890282 |
Similar Items
-
Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol
by: Lijun Gao, et al.
Published: (2019-01-01) -
An ultralightweight RFID authentication protocol with CRC and permutation
by: Gao, Lijun, et al.
Published: (2014) -
A server independent authentication scheme for RFID systems
by: Wang, Bin, et al.
Published: (2013) -
A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems
by: Shu, Yantai, et al.
Published: (2013) -
SecMAP: A Secure RFID Mutual Authentication Protocol for Healthcare Systems
by: Feng Zhu
Published: (2020-01-01)