4.1 Article

A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications

Related references

Note: Only part of the references are listed.
Article

Smart card security mechanism with dynamic key

N Noprianto et al.

Jurnal Infotel (2022)

Article Computer Science, Artificial Intelligence

A comprehensive taxonomy of security and privacy issues in RFID

Atul Kumar et al.

Summary: The Internet of Things consists of various devices and faces security challenges like replay attacks, information disclosure, tracking, etc. Researchers have proposed different security methods to deal with these attacks and discussed the IoT architecture, attack classification, and security solutions.

COMPLEX & INTELLIGENT SYSTEMS (2021)

Review Chemistry, Analytical

A Review of RFID Sensors, the New Frontier of Internet of Things

Filippo Costa et al.

Summary: This paper reviews the technological solutions for RFID sensing and discusses the benefits of using RFID sensors, such as the absence of batteries and lower cost. It categorizes RFID sensors into chipped and chipless configurations and analyzes their working mechanisms. While chip-equipped RFID sensing is mature and increasingly present in the market, chipless RFID sensing is a relatively new concept that requires further research for customization in specific scenarios.

SENSORS (2021)

Article Telecommunications

A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications

Atakan Arslan et al.

Summary: RFID technology is widely used in the Internet of Things era, but security and privacy issues have always existed. In recent years, researchers have proposed RFID authentication protocols based on elliptic curve cryptography to improve security. This study proposes a secure, privacy-preserving, and efficient ECC-based RFID authentication protocol, achieving the most effective solution in a real-world environment.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Computer Science, Software Engineering

An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols

B. B. Gupta et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Proceedings Paper Engineering, Electrical & Electronic

Design and Implementation of Smart Card based Secure Key Storage The Blockchain E-voting Application

Damayani Suyitno et al.

2020 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, ADVANCED MECHANICAL AND ELECTRICAL ENGINEERING (ICITAMEE 2020) (2020)

Article Computer Science, Theory & Methods

End-to-End Traceability of ICs in Component Supply Chain for Fighting Against Recycling

Yuqiao Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Hardware & Architecture

Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments

Jungho Kang

JOURNAL OF SUPERCOMPUTING (2019)

Article Computer Science, Information Systems

Prototype Device With Lightweight Protocol for Secure RFID Communication Without Reliable Connectivity

Ahmed Alamer et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Secure and efficient two-factor zero-knowledge authentication solution for access control systems

Lukas Malina et al.

COMPUTERS & SECURITY (2018)

Article Chemistry, Multidisciplinary

A Comparison of RFID Anti-Collision Protocols for Tag Identification

Nikola Cmiljanic et al.

APPLIED SCIENCES-BASEL (2018)

Review Chemistry, Analytical

Survey on Prominent RFID Authentication Protocols for Passive Tags

Rania Baashirah et al.

SENSORS (2018)

Article Computer Science, Information Systems

An Improved Two-Way Security Authentication Protocol for RFID System

Baolong Liu et al.

INFORMATION (2018)

Proceedings Paper Computer Science, Interdisciplinary Applications

Implementation of the Enhanced RC5 (ERC5) Algorithm in an RFID-based Payment Scheme

Excel B. Villanueva et al.

2018 2ND INTERNATIONAL CONFERENCE ON BUSINESS AND INFORMATION MANAGEMENT (ICBIM 2018) (2018)

Proceedings Paper Engineering, Electrical & Electronic

Authentication Security in Radio Frequency Identification with IDEA Algorithm

H. Nurdiyanto et al.

INTERNATIONAL SYMPOSIUM ON MATERIALS AND ELECTRICAL ENGINEERING (ISMEE) 2017 (2018)

Article Telecommunications

Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking

Hung-Yu Chien

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Telecommunications

ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems

Mohammed Issam Younis et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Computer Science, Information Systems

Efficient authentication scheme with tag-identity protection for EPC Class 2 Generation 2 version 2 standards

Hung-Yu Chien

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2017)