Abstract. Nowadays, plenty of radio frequency identification (RFID) systems have been proposed and used in the real world for convenience. An RFID system ...
This paper proposes an authentication protocol for RFID systems to improve the computational eficiency with a long-term secure value and provide the same ...
This paper reviews weaknesses highlighted in existing proposals for a family of mutual authentication protocols belonging to the ultra-lightweight class, which ...
Mutual authentication is executed in RFID system through the characteristics of Hash function, which prevents the phenomenon of counterfeit in internal system.
This underscores the need for an efficient and secure mutual authentication protocol for RFID systems. The aims of an adversary against such an authentication ...
In this study, we evaluate the security level of recent ultra-lightweight mutual authentication protocols and show their susceptibility to replay and ...
However, Safkhani et al.[12] proved that Cho et al.'s protocol is not resistant against the desynchronization and the impersonation attacks. Also ...
In this paper we cryptanalysis a hash based RFID mutual authentication protocol which has been recently proposed by Cho et al. More precisely, we present the ...
In this paper, we consider the security of a recently proposed mutual authentication protocol by Wei et al. which is a hash based protocol. We present efficient ...
Authentication is one of the most basic and important cryptographic tasks. Mutual authentication protocols play a crucial role on the security of RFID ...