You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

4 January 2019

Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles

,
,
,
and
1
State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, China
2
Key Laboratory of the Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Recent Advances in Crowdsensing and Its Security, Privacy and Trust Challenges

Abstract

Radio frequency identification (RFID) is a kind of non-contact automatic identification technology. The Internet of Vehicles (IoV) is a derivative of the Internet of Things (IoT), and RFID technology has become one of the key technologies of IoV. Due to the open wireless communication environment in RFID system, the RFID system is easy to be exposed to various malicious attacks, which may result in privacy disclosure. The provision of privacy protection for users is a prerequisite for the wide acceptance of the IoV. In this paper, we discuss the privacy problem of the RFID system in the IoV and present a lightweight RFID authentication scheme based on permutation matrix encryption, which can resist some typical attacks and ensure the user’s personal privacy and location privacy. The fast certification speed of the scheme and the low cost of the tag is in line with the high-speed certification requirement in the Internet of vehicles. In this thesis, the specific application scenarios of the proposed RFID authentication scheme in the IoV is also discussed.

1. Introduction

Radio Frequency Identification (RFID) is a technology that exchanges data through electromagnetic waves or electromagnetic fields, which enables the non-contact identification of specific objects []. Due to the convenience and low cost of RFID technology, RFID technology has been widely used in industrial automation, commercial automation, transportation management, etc. [].
The Internet of Vehicles (IoV) is the future of the Vehicular Ad-Hoc Networks, interconnecting vehicles, vehicle Telematics, and connecting vehicles. Combining these technologies and learning from the Internet of Things (IoT), the IOV brings smartness into the vehicular environment, improving the vehicles’ intelligence and vehicles’ networking []. As a key member of the IoT, IoV will greatly change future life []. IoV is a brand-new network application, which is the application of Internet of Things technology in the intelligent transportation. RFID is the core foundation of the new generation of intelligent transportation system []. RFID can achieve fast and autonomous identification, without the intervention of manual operation. In addition, the RFID tag has small volume with strong anti-pollution ability and good durability, and the RFID reader has a large reading distance, so the RFID system can work normally in a harsh environment []. Because of the excellent performance of the RFID system, RFID technology has become one of the key technologies in the IoV. The RFID-based smart transportation systems make digital management of vehicles possible, including real-time tracking, intelligent traffic warning, vehicle operation monitoring, etc. [].
However, the smart RFID-based transportation systems may disclose users’ privacy since the open wireless communication in RFID systems is vulnerable to many attacks. Users’ privacy in IoV mainly includes personal information and location information. The personal information refers to the user’s identity, vehicle license information, credit card information, and other personal information. Vehicle location information leakage can lead to malicious tracking []. In the early application of RFID technology in IoV, such as the ETC technology, limited by the restrained storage capacity and poor computing capability of RFID tags, the adopted RFID authentication schemes usually have a poor performance in security and privacy. With the development of RFID technology, the storage and computing capability of tags have been improved. Meanwhile, the emerging cloud computing can help improve the security and privacy protection capability of RFID authentication scheme. Lightweight RFID security authentication scheme has been applied in the IoV. Designing a privacy-protected RFID authentication scheme for the IoV environment will greatly promote the development of the IoV [].
In this paper, on the premise of considering the application requirements of the Internet of vehicles environment and ensuring users’ privacy and security, a permutation matrix encryption based ultralightweight secure RFID scheme is designed for the IoV, which reduces tag costs and improves the authentication speed. The new scheme designed in this paper ensures users’ privacy in IoV and the scheme can resist common attacks such as replay attack, tag-tracking attack, and desynchronization attack. In addition, the proposed scheme can achieve high-speed authentication in the IoV, and the low cost of tags used in the scheme is conductive to large-scale application.
The rest of the paper is organized as follows: In Section 2, we introduced the background of the application of RFID technology in the Internet of vehicles and reviewed some existing protocols. Next, the paper presents the permutation matrix encryption based ultralightweight secure RFID scheme in IoV in Section 3. Section 4 shows the security and performance analysis of the new scheme. Finally, some conclusions of the proposed scheme and the discussion of the future work are introduced in Section 5.

3. Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme for IoV

3.1. Permutation Matrix

A permutation matrix is a matrix obtained by permuting the rows of an identity matrix according to some permutation of the numbers “1”. Every row and column therefore contains precisely a single 1 with 0 s everywhere else, and every permutation corresponds to a unique permutation matrix. The product of the permutation matrix and its transposed matrix is the identity matrix. So we can use the permutation matrix as a key to encrypt information and decrypt the information with the transposed matrix of the permutation matrix, since there is only one "1" in each row and column of the permutation matrix. When we decrypt the data encrypted by permutation matrix, we can obtain the decrypted data by directly transforming the position of “0” or “1” in the data through the position of “1” in the permutation matrix. This can simplify the circuit in the tag, and reduce the number of logic gates in the tag and the time spend on calculation.

3.2. Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme

When designing the protocol, we assume that the data transmission between the background server and the reader of the system is secure. The protocol proposed in this paper focuses on the authentication and information security between reader and tag. The system notations are presented in Table 1.
Table 1. List of notations used.
As indicated in Table 1, T 1 represents the current time that the reader receives from the Internet when the reader makes an authentication request to the tag; T 0 represents the time when the reader is successfully identified by the tag in the last session. The back-end server use the secret key S shared between it and the tag to identify and authenticate the tag. R represents the random number generated by the reader each time when the reader sends query request to the tag. M 1 , M 2 are two 128 × 128 permutation matrices stored in the tag for both decryption and encryption. M 1 - 1 , M 2 - 1 are two 128 × 128 transposed matrix of M 1 and M 2 stored in the reader.
Our scheme consists of two phases, including the initialization phase and the authentication phase, which is shown in Figure 1. The details of the protocol are as follows.
Figure 1. Proposed scheme.

3.2.1. Initialization Phase

In the initialization phase, the back-end server shares the secret key S with each legitimate tag. The legitimate reader and tag store the corresponding permutation matrix respectively. The reader is connected with the Internet to get a real-time Unix timestamp.

3.2.2. Authentication Phase

  • Reader → Tag: R, H 2
    The reader generates random number R and encodes the current network time as T 1 . The reader encrypts T 1 with permutation matrix M 1 - 1 , M 2 - 1 : H 1 = T 1 × M 1 - 1 , H 2 = H 1 R × M 2 - 1 . Then the reader sends R and H 2 to tag as a challenge.
  • Tag → Reader: Y 2 , G
    After receiving R and H 2 , the tag uses R and M 1 , M 2 to decode H 2 to get T 1 . The tag will compare T 1 with T 0 stored in tag. Only when the last 64 bits of T 1 are greater than T 0 no more than 48 h that the reader is authenticated. If the reader is authenticated, the tag updates the value of T 0 with T 1 and uses the updated T 0 to compare with next T 1 in next session. Then the tag encrypts the I D in two ways. In the first way: Y 1 = I D × M 1 , Y 2 = Y 1 T 1 × M 2 . Y 2 is the the encrypted I D with permutation matrix M 1 , M 2 , and T 1 by the tag. G = S R + I D , in this way, I D is encrypted with the secret key S.
  • Reader → Back-end server: I D , R, G
    The reader decrypts I D from Y 2 after receiving Y 2 , G. Reader sends G, I D , R to the back-end server. Back-end server calculates I D = G - S R . The back-end server compares I D with I D . If I D is same with I D , the tag is legitimate. Therefore, mutual authentication is achieved.

3.3. Protocol Implementation Details

3.3.1. Data Encoding

In the proposed protocol, T 1 , T 0 , R, and I D are all 128-bit binary numbers. The secret key S shared by the back-end server and tag and the permutation matrix used for encryption and decryption are distributed by trusted third parties, which is the basis of information confidentiality of the protocol. The secret key S and I D should be coded with redundant information to ensure both the number of “0” and “1” are 64 bits, to improve the confidentiality of protocol. The same rules should be followed when coding T 1 to prevent attackers from cracking the data using exhaustive method. T 1 is encoded in a way that the first 64 bits are randomly filled by the reader to make the number of “1” and “0” are both 64 in T 1 . The latter 64 bits in T 1 represents the Unix timestamp which is the number of seconds that have elapsed since 00:00:00 Coordinated Universal Time (UTC), Thursday, 1 January 1970.

3.3.2. The Tag

The tag adopted in the scheme is active tag which is powered by vehicle to meet the requirements of launch distance in the IoV. The tag stores T 0 in the registers and the registers will lose the value of stored T 0 after the power is off. So the tag will initialize T 0 to the current time each time when the vehicle starts.
In our scheme, both the encryption and decryption of the data in the tag are completed by multiplying M 1 and M 2 . The same matrix multiplication circuit can be used to encrypt and decrypt in the tag to reduce the cost of tags.

3.3.3. The Role of R and T 1

The operation H 1 R is designed to prevent the attacker from tracking the vehicle through a linear increase in T 1 . Similarly, operation Y 1 T 1 and S R is also used to update Y 2 and G in different sessions to prevent the attacker from tracking the vehicle. T 1 also acts as a shared secret key between the reader and the tag. The tag computes Y 1 T 1 to encrypt I D . The reader can get the correct I D with the correct T 1 .

4. Analysis and Evaluation

The security and privacy analysis and performance evaluation of the proposed scheme are given in this section. In addition, the security proof of this protocol is described by BAN logic proof.

4.1. Security and Privacy Analysis

  • Tag anonymity: Tag anonymity is the basis of the RFID system to protect users’ privacy in the IoV. In the proposed protocol, the secret data I D is encrypted by the 128 × 128 permutation matrices and the number of “1” and “0” are both 64 in T 1 and I D . Even if the attacker gets the H 2 or G, at least C 128 64 × C 128 64 times operation needed to obtain the secret data I D or T 1 . According to the current computing power of computers, it is deemed that encrypted data cannot be obtained by brute force. Thus, the secret data is safe in our scheme and the tag anonymity is ensured.
  • Resistance to tag-tracking attacks: The tag-tracking attack refers to the attacker can determine a certain tag by eavesdropping the data transmitted during communication. So the tag can be tracked. In our scheme, both T 1 and R updated in every session, so the data Y 2 and G that tag sends to reader differs in every session. It is difficult for the attackers to find the correlations of data in two sequential sessions. The proposed scheme can resist tag-tracking attacks.
  • Mutual authentication: In the protocol, the permutation matrix in the tag and the reader is secret. Only the legitimate tag and the legitimate reader have the corresponding encryption and decryption matrix. The secret key S shared by the background server and labels is also distributed by trusted third parties and is confidential. The purpose of the tag decrypting H 2 to get T 1 and comparing T 1 with T 0 is identifying the legitimate reader. Only the legitimate reader can be authenticated successfully. Also, the reader can only obtain the correct I D after the tag encrypts it with the corresponding permutation matrix. When the I D obtained by the reader is equal to the I D decrypted by the back-end server using the secret key S, the back-end server authenticates the tag successfully. Thus, the mutual authentication is ensured in the new scheme.
  • Resistance to replay attacks: Replay attack refers to that an attacker, after stealing a valid message between a tag and a reader transmitted in the previous session, sends the obtained message to the original receiver for authentication. In our scheme, the tag stores the T 0 which is the time of reader authenticated successfully in last session. If the attacker sends the old (R, H 2 ) to the tag, T 1 that the tag decrypts from the old (R, H 2 ) will not greater than T 0 and the tag will identify the attacker to be illegal. In the same way, if the attacker sends the old ( Y 2 ,G) to the reader, wrong I D will be decrypted and the back-end server will identify the attacker as an illegal tag. In the application scenarios, the time interval between two successful authentication sessions is much longer than one second. In our scheme, when the tag compared T 1 and T 0 , only when T 1 is bigger than T 0 will the reader be authenticated. Therefore, the attacks which are carried out immediately (delta t < 1 s) will not be successful. Our scheme can resist replay attacks.
  • Resistance to de-synchronization: The permutation matrix between the tag and the reader and the key S shared between the tag and the server do not need to be updated. The updated time T 1 and the random number R in each session are generated by the reader, and the reader will update T 0 only after it successfully authenticates the tag. The tag and the server will not mutually authenticated unsuccessfully because of one authentication failure, so the proposed protocol can effectively resist the de-synchronization attack.
A comparison of our proposed scheme with recent schemes is listed in Table 2. From the comparison of the security in Table 2, it can be seen that the protocols listed in the table have more or less security performance defects. The protocol designed in this paper has better security. It can effectively resist various common attacks. In addition, the proposed scheme can prevent the leakage of users’ privacy in the IoV effectively. Thus, the proposed scheme meets the design objectives and requirements of the protocol.
Table 2. Security comparison.

4.2. Performance Evaluation

We conducted FPGA based instantiation and synthesis in Vivado 2017.4 environment for Virtex-7 FPGAs with 128-bit data input. The simulation results are shown in Figure 2 and the part of Verilog HDL is shown in Figure 3.
Figure 2. Behavioral simulation.
Figure 3. Using Verilog HDL to design label circuit.
We compared resource utilization of our protocol and other ultralightweight RFID authentication protocols in Table 3. Umar Mujahid’s protocol [] simulated with 96-bit data input and Sadaiyappan’s protocol [] simulated with 32-bit data.
Table 3. Resource the tag used in tag.
We also compare the performance of other authentication protocol with the new scheme in Table 4. In Table 4, “⊕” is the X O R operation. “+” is the additive operation. “∨” is the O R operation. “ R o t ” is the cascade operation. “×” is the multiplication with permutation matrix operation, “ H a s h ” is the displacement operation, and “ P R N G ” is the hash operation. “ P R N G ” is a preset operation for EPC Class-1 Gen-2 tags, denoted in the EPC Class-1 Gen-2 Standard. As we can see, the proposed scheme just involves simple operations “⊕”, “+” and operation “×”. “⊕” and “+” are simple bitwise operations and both of them are low-cost. When the tag stores the permutation matrix, the tag only needs to store the position of "1" in each column. In the circuit where 128-bit data is multiplied by the replacement matrix, the result after replacement can be obtained according to the position of “1” in the replacement matrix stored in the tag, without a lot of calculation. In our scheme, tags do not require “ H a s h ” operation and “ P R N G ” operations. Only simple bitwise operations, lookup operations, and comparison operations are required. The cost of the tag in the new scheme is presented in Table 3. “LUT” refers to “Look-Up-Table” and it is the structure of the smallest unit of the FPGA. It can be seen from the table that the tags we used in our scheme require few FPGA resources, and the production cost of the tags is low, which is beneficial to the large-scale application in the IoV.
Table 4. Computation cost comparison.
In addition, there is only one communication between the tag and reader during the whole authentication process in our scheme. Compared to other protocols that require multiple communications between the tag and the reader during the authentication process, our scheme is more applicable to the mutual authentication between readers and high-speed vehicles in the context of IoV.

4.3. BAN Logic Proof

In 1989, Burrows, Abadi, and Needham presented a logic based on knowledge and belief, the main idea of which was to introduce new beliefs from known beliefs based on subjective beliefs. In this section, we use the BAN logic to formally analyze the proposed protocol.
Before BAN logical proof process, we briefly introduce its symbols and rules that we will use.
Symbols:
  • P | X : The entity P believes X is true.
  • P X : The entity P receives the message containing X, which means a certain entity Q sends a message containing X to P.
  • P | X : The entity P has sent out message containing X.
  • # ( X ) : X is fresh.
  • Sensors 19 00152 i001: K is the shared secret of entity P and entity Q, and other entities do not know K except P and Q.
  • P Q : P sends messages to Q.
  • ⊢: A meta-linguistic symbol, which means that the conclusion is a drawn from premise.
Rules:
  • Message-meaning rules Sensors 19 00152 i002: If P believes that K is the shared secret between P and Q, and receives the message { X } K , then P believes that Q has sent message X.
  • Freshness rule P | # ( X ) P | # ( X , Y ) : If a part of the message X is fresh, the message ( X , Y ) is fresh.
In our BAN logical proof, T denotes the tag; R denotes the reader; BS denotes the back-end server. Proof process is divided into five parts:

4.3.1. Protocol Description

  • R e T : { R , T 1 M 1 - 1 R M 2 - 1 }
  • T R e : { S R + I D , I D M 1 T 1 M 2 }
  • R e B S : { R , S R + I D , I D }

4.3.2. Protocol Idealization

  • R e T : R , { T 1 , R } M 1 - 1 , M 2 - 1
  • T R e : { R , I D } S , { I D , T 1 } M 1 , M 2
  • R e B S : R , { R , I D } S , I D

4.3.3. Initial Assumptions

  • Sensors 19 00152 i003
  • Sensors 19 00152 i004
  • B S | # ( R e )

4.3.4. Proving Goals

  • T | R e
  • B S | T | # { R , I D }

4.3.5. Proof Process

From BAN logic message-meaning rules Sensors 19 00152 i002, Initial Assumptions 1 and Protocol Idealization 1, we can get:
T R e : { R , I D } S , { I D , T 1 } M 1 , M 2 ,   T R , { T 1 , R } M 1 - 1 , M 2 - 1 T | R e | T 1
The tag can determine the correctness of T 1 by the time of the vehicle. If T 1 meets the requirements, the tag authenticates the reader. That is Proving Goals 1.
From BAN logic message-meaning rules Sensors 19 00152 i002, Initial Assumptions 2 and Protocol Idealization 3, we can get:
Sensors 19 00152 i005
From BAN logic freshness rule P | # ( X ) P | # ( X , Y ) and Initial Assumptions 3, we can get:
B S | # ( R e ) B S | # { R , I D }
Therefore, we get B S | T | # { R , I D } . Proving Goals 2 is proved.

5. Discussion and Conclusions

With the rapid development and application of Internet of Things technology, IoV technology as a vertical application of the Internet of Things has great development prospects. Although RFID has found wide applications in daily life, the security problems and privacy problems caused by its open wireless communication environment still hinder its further development. In the application of the IoV technology, users pay more attention to privacy security. Designing a secure RFID authentication protocol suitable for the IoV is a challenging research topic. On the basis of studying the security issues and privacy requirements of IoV technology, this paper designs an RFID authentication protocol that can resist common attacks and ensure the privacy of users. The protocol encrypts and authenticates related information based on the permutation matrix. The current time and random numbers involved in the update phase make the proposed scheme resistant against replay attack and ensure users’ data privacy and location privacy. The protocol authentication process is simple and high-speed. The authentication process does not require the back-end server to do a lot of data searching, and the tag ID can be obtained after successful authentication, which is applicable to the situation of massive data stored in the back-end server in the Internet of vehicles. In addition, the simulation results show that the tag circuit uses fewer gates. Thus, less computing resources are required in the authentication process, which is suitable for large-scale applications.
The protocol designed in this paper can be applied to traffic statistics, toll collection systems of roads and bridges, vehicle access management systems, and so on due to its fast certification speed, strong information confidentiality, and non-repudiation after the tag is authenticated successfully. According to the positioning function of the RFID system, the protocol can also be applied to location-based IoV services such as navigation services.
The security of the protocol can be further improved. In the protocol designed in this paper, the replacement matrix used for encryption and the secret key shared by the tag and the background server are both fixed, which increases the possibility and harmfulness of information leakage. The protocol can be improved for this weakness and the permutation matrix and shared secret key could be updated after every authentication under the premise of ensuring protocol security, so as to reduce the possibility of the permutation matrix and key being cracked.
In the future, the protocol can be improved to reduce the tag cost. For example, the length of data can be reduced by optimizing the encryption method on the premise of ensuring the protocol security, so as to reduce the tag computational costs.

Author Contributions

Conceptualization, K.F. and J.K.; Data curation, H.L. and Y.Y.; Formal analysis, S.Z., H.L. and Y.Y.; Funding acquisition, K.F. and H.L.; Investigation, K.F. and J.K.; Methodology, K.F. and J.K.; Project administration, K.F.; Writing—original draft, K.F. and J.K.; Writing—review & editing, S.Z.

Funding

This work was funded by the National Key R&D Program of China (No. 2017YFB0802300), the National Natural Science Foundation of China (No. 61772403 and No. U1401251), Natural Science Basic Research Plan in Shaanxi Province of China (No. 2017JM6004), the Fundamental Research Funds for the Central Universities, and National 111 Program of China B16037 and B08038.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, B.; Ma, X.X. Design and Analysis of a Lightweight Mutual Authentication Protocol for RFID. J. Univ. Electron. Sci. Technol. China 2013, 3, 107–112. [Google Scholar]
  2. Liu, Y.L.; Qin, X.L.; Zhao, X.J.; Hao, G.S.; Dong, Y.Q. Lightweight RFID Authentication Protocol Based on Digital Signature. Comput. Sci. 2015, 42, 95–107. [Google Scholar]
  3. Mendiboure, L.; Chalouf, M.A. Towards a Blockchain-Based SD-IoV for Applications Authentication and Trust Management. In Proceedings of the 5th International Conference, Paris, France, 20–22 November 2018. [Google Scholar]
  4. Sun, X.H. Key Technology and Its Application of IoV. Commun. Technol. 2013, 46, 51–54. [Google Scholar]
  5. Nan, C.L.; Liu, S.C.; Zhou, S.J.; Zhao, X.N. RFID Model for the Internet of Vehicles. Comput. Syst. Appl. 2013, 12, 32–35. [Google Scholar]
  6. Yan, Z.G.; Liu, Z.C. The Preliminary Study on the Test Platform for the Internet of Vehicles. Mechatronics 2011, 9. [Google Scholar] [CrossRef]
  7. Han, W.; Li, L. Analysis based on vehicle networking application and construction of RFID technology. Electron. Test 2013, 11, 68–69. [Google Scholar]
  8. Liu, Y.L. RFID Secure Authentication Protocol for Privacy-Preserving. Ph.D. Thesis, Nanjing University of Astronautics, Nanjing, China, June 2014. [Google Scholar]
  9. Ren, Z.G.; Gao, Y.B. Design of Electronic Toll Collection System in Expressway Based on RFID. In Proceedings of the International Conference on Environmental Science and Information Application Technology, Wuhan, China, 4–5 July 2009. [Google Scholar]
  10. Ahmed, M.; Zouheir, L.; Mohamed, S.; Mostafa, B. A novel mutual authentication scheme for low-cost RFID systems. In Proceedings of the International Conference on Wireless Networks and Mobile Communications, Fez, Morocco, 26–29 October 2016. [Google Scholar]
  11. Fan, K.; Jiang, W. Lightweight RFID Protocol for Medical Privacy Protection in IoT. IEEE Trans. Ind. Inform. 2018, 14, 1656–1665. [Google Scholar] [CrossRef]
  12. Chen, X.Z. Research on Car-network Technology. Comput. Knowl. Technol. 2013, 9, 240–251. [Google Scholar]
  13. Fan, K.; Wang, W. Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Netw. Appl. 2018, 11, 732–734. [Google Scholar] [CrossRef]
  14. Musfiq, R.; Raghav, S.; Srinivas, S. Lightweight protocol for anonymity and mutual authentication in RFID systems. In Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 9–12 January 2015. [Google Scholar]
  15. Mei, Y. Research on the Privacy Preservation for VANET. Ph.D. Thesis, Huazhong University of Science and Technology, Wuhan, China, June 2014. [Google Scholar]
  16. Ahmed, M.; Mohamed, S.; Zouheir, L.; Mostafa, B. Security analysis of low cost RFID systems. In Proceedings of the 5th Workshop on Codes, Cryptography and Communication Systems, El Jadida, Morocco, 27–28 November 2014. [Google Scholar]
  17. Chen, Y.H. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Comput. Stand. Interfaces 2007, 29, 254–259. [Google Scholar] [CrossRef]
  18. Chien, C.L. Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection. Eng. Appl. Artif. Intell. 2009, 22, 1284–1291. [Google Scholar] [CrossRef]
  19. Yu, C.H. An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags. In Proceedings of the Fifth International Symposium on Parallel Architectures, Algorithms and Programming, Taipei, China, 17–20 December 2012. [Google Scholar]
  20. Behzad, A.; Karim, B. Securing Key Exchange and Key Agreement Security Schemes for RFID Passive Tags. In Proceedings of the 24th Iranian Conference on Electrical Engineering, Shiraz, Iran, 10–12 May 2016. [Google Scholar]
  21. Chien, H.Y. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Trans. Dependable Secure Comput. 2007, 4, 337–340. [Google Scholar] [CrossRef]
  22. Sadaiyappan, T.; Manoj, K.K. FPGA Implementation of Mutual Authentication Protocol Using Modular Arithmetic. Int. J. Comput. Sci. Mob. Comput. 2014, 3, 133–139. [Google Scholar]
  23. Sadaiyappan, T.; Manoj, K.K. A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash. Int. J. Distrib. Sens. Netw. 2016, 12, 1–14. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.