Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

An Enhanced Authentication Protocol Suitable for Constrained RFID Systems

Full metadata record
DC Field Value Language
dc.contributor.authorHosseinzadeh, Mehdi-
dc.contributor.authorServati, Mohammad Reza-
dc.contributor.authorRahmani, Amir Masoud-
dc.contributor.authorSafkhani, Masoumeh-
dc.contributor.authorLansky, Jan-
dc.contributor.authorJanoscova, Renata-
dc.contributor.authorAhmed, Omed Hassan-
dc.contributor.authorTanveer, Jawad-
dc.contributor.authorLee, Sang-Woong-
dc.date.accessioned2024-06-10T10:31:04Z-
dc.date.available2024-06-10T10:31:04Z-
dc.date.issued2024-02-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/91489-
dc.description.abstractRFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privacy. Vulnerabilities such as message tampering, interception, and eavesdropping pose significant risks to the integrity of the system. This study examines the effectiveness of two recently proposed ultra-lightweight RFID authentication protocols, URASP and KUAJB, in addressing these security challenges. Surprisingly, our findings reveal that both URASP and KUAJB protocols are susceptible to secret disclosure attacks, despite their claims of providing robust security. Consequently, the development of a truly ultra-lightweight protocol that ensures adequate security becomes a formidable task. As a potential solution, the enhancement of the URASP protocol through the integration of a simple cryptographic primitive is suggested to bolster its security measures.-
dc.format.extent19-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleAn Enhanced Authentication Protocol Suitable for Constrained RFID Systems-
dc.typeArticle-
dc.identifier.wosid001216600100001-
dc.identifier.doi10.1109/ACCESS.2024.3364690-
dc.identifier.bibliographicCitationIEEE ACCESS, v.12, pp 61610 - 61628-
dc.description.isOpenAccessY-
dc.identifier.scopusid2-s2.0-85187244111-
dc.citation.endPage61628-
dc.citation.startPage61610-
dc.citation.titleIEEE ACCESS-
dc.citation.volume12-
dc.type.docTypeArticle-
dc.publisher.location미국-
dc.subject.keywordAuthorProtocols-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorRadiofrequency identification-
dc.subject.keywordAuthorWireless networks-
dc.subject.keywordAuthorCryptography-
dc.subject.keywordAuthorInternet of Things-
dc.subject.keywordAuthorHash functions-
dc.subject.keywordAuthorRFID-
dc.subject.keywordAuthorultra-lightweight-
dc.subject.keywordAuthorpermutation-
dc.subject.keywordAuthorsecret disclosure attack-
dc.subject.keywordAuthorQuark hash function-
dc.subject.keywordPlusMUTUAL AUTHENTICATION-
dc.subject.keywordPlusLIGHTWEIGHT-
dc.subject.keywordPlusSCHEME-
dc.subject.keywordPlusCRYPTANALYSIS-
dc.subject.keywordPlusSECURE-
dc.subject.keywordPlusENVIRONMENT-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Sang-Woong photo

Lee, Sang-Woong
College of IT Convergence (Department of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE