Secure RFID authentication schemes based on security analysis and improvements of the USI protocol
Wireless radio frequency identification (RFID) has been widely used as the core technology of the Internet of Things, but it also brings many potential security risks. In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols hav...
Main Authors: | Gao, Lijun, Zhang, Lu, Lin, Feng, Ma, Maode |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Journal Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/105994 http://hdl.handle.net/10220/48844 http://dx.doi.org/10.1109/ACCESS.2018.2890282 |
Similar Items
-
Interactive learning on RFID via simple project
by: Sun, Yao Zhou
Published: (2024) -
Double verification protocol via secret sharing for low-cost RFID tags
by: Liu, Yali, et al.
Published: (2019) -
An ultralightweight RFID authentication protocol with CRC and permutation
by: Gao, Lijun, et al.
Published: (2014) -
A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems
by: Shu, Yantai, et al.
Published: (2013) -
Secure group mobility support for 6LoWPAN networks
by: Qiu, Yue, et al.
Published: (2020)