RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4052535 | PMC |
http://dx.doi.org/10.1155/2014/704623 | DOI Listing |
Sensors (Basel)
January 2025
School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea.
The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers.
View Article and Find Full Text PDFSensors (Basel)
January 2025
School of Communication and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China.
The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant security threats, such as eavesdropping, replay attacks, and message tampering. To address these challenges, this paper proposes the Efficient Cluster-based Mutual Authentication and Key Update Protocol (ECAUP) designed to secure IoV systems within 5G-enabled sensor networks.
View Article and Find Full Text PDFSensors (Basel)
December 2024
Department of Biomedical Engineering, Lebanese International University, Beirut P.O. Box 146404, Lebanon.
The integration of liveness detection into biometric systems is crucial for countering spoofing attacks and enhancing security. This study investigates the efficacy of photoplethysmography (PPG) signals, which offer distinct advantages over traditional biometric techniques. PPG signals are non-invasive, inherently contain liveness information that is highly resistant to spoofing, and are cost-efficient, making them a superior alternative for biometric authentication.
View Article and Find Full Text PDFSci Rep
January 2025
PRINCE Laboratory Research, ISITcom, Hammam Sousse, University of Sousse, Sousse, Tunisia.
With the advancement of this digital era and the emergence of DApps and Blockchain, secure, robust and transparent network transaction has become invaluable today. These traditional methods of securing the transactions and maintaining transparency have encountered many challenges. It includes some such issues as follows: data privacy, centralized vulnerability, inefficiency in fraud detection and much more.
View Article and Find Full Text PDFJ Dairy Sci
January 2025
Department of Agronomy, Food, Natural Resources, Animals and Environment (DAFNAE), University of Padova, 35020, Legnaro (PD), Italy.
Increasing consumer concerns underscore the importance of verifying the practices and origins of food, especially certified premium products. The aim of this study was to evaluate the ability of Fourier-transform mid-infrared (FT-MIR) spectroscopy to authenticate animal welfare parameters, farming practices, and dairy systems. Data on farm characteristics were obtained from the Parmigiano Reggiano Consortium in northern Italy.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!