A Survey of RFID Authentication Protocols
RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) I...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1350 |
---|---|
container_issue | |
container_start_page | 1346 |
container_title | |
container_volume | |
creator | Yousuf, Y. Potdar, V. |
description | RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP and M2MAP. |
doi_str_mv | 10.1109/WAINA.2008.214 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4483106</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4483106</ieee_id><sourcerecordid>4483106</sourcerecordid><originalsourceid>FETCH-LOGICAL-i215t-906bed0ae43d2cf1fcc95deb0c6f7e5047f4a1a320b1d917835de16e40c12183</originalsourceid><addsrcrecordid>eNotjM9LwzAYQAMy0M1dvXjp1UPr9-VXk2OZTgvDDR14HGn6BSNzkTYT9t-r6OnBe_AYu0KoEMHevjbtU1NxAFNxlGdsCrW2SoDVesKmv95yXit1zubj-A4AaLVRxlywm6Z4OQ5fdCpSKJ6X7V3RHPMbHXL0Lsd0KDZDysmn_XjJJsHtR5r_c8a2y_vt4rFcrR_aRbMqI0eVSwu6ox4cSdFzHzB4b1VPHXgdalIg6yAdOsGhw95ibcRPRU0SPHI0Ysau_7aRiHafQ_xww2knpREIWnwDoNpADw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Survey of RFID Authentication Protocols</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yousuf, Y. ; Potdar, V.</creator><creatorcontrib>Yousuf, Y. ; Potdar, V.</creatorcontrib><description>RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP and M2MAP.</description><identifier>ISBN: 0769530966</identifier><identifier>ISBN: 9780769530963</identifier><identifier>DOI: 10.1109/WAINA.2008.214</identifier><identifier>LCCN: 2008922755</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Batteries ; Cryptographic protocols ; Cryptography ; Ecosystems ; EMAP ; LMAP ; M2MAP ; Prototypes ; Radiofrequency identification ; RFID security ; RFID tags ; Security ; Wireless application protocol</subject><ispartof>22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008), 2008, p.1346-1350</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4483106$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2053,27907,54902</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4483106$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yousuf, Y.</creatorcontrib><creatorcontrib>Potdar, V.</creatorcontrib><title>A Survey of RFID Authentication Protocols</title><title>22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)</title><addtitle>AINAW</addtitle><description>RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP and M2MAP.</description><subject>Authentication</subject><subject>Batteries</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Ecosystems</subject><subject>EMAP</subject><subject>LMAP</subject><subject>M2MAP</subject><subject>Prototypes</subject><subject>Radiofrequency identification</subject><subject>RFID security</subject><subject>RFID tags</subject><subject>Security</subject><subject>Wireless application protocol</subject><isbn>0769530966</isbn><isbn>9780769530963</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjM9LwzAYQAMy0M1dvXjp1UPr9-VXk2OZTgvDDR14HGn6BSNzkTYT9t-r6OnBe_AYu0KoEMHevjbtU1NxAFNxlGdsCrW2SoDVesKmv95yXit1zubj-A4AaLVRxlywm6Z4OQ5fdCpSKJ6X7V3RHPMbHXL0Lsd0KDZDysmn_XjJJsHtR5r_c8a2y_vt4rFcrR_aRbMqI0eVSwu6ox4cSdFzHzB4b1VPHXgdalIg6yAdOsGhw95ibcRPRU0SPHI0Ysau_7aRiHafQ_xww2knpREIWnwDoNpADw</recordid><startdate>20080101</startdate><enddate>20080101</enddate><creator>Yousuf, Y.</creator><creator>Potdar, V.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20080101</creationdate><title>A Survey of RFID Authentication Protocols</title><author>Yousuf, Y. ; Potdar, V.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i215t-906bed0ae43d2cf1fcc95deb0c6f7e5047f4a1a320b1d917835de16e40c12183</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Authentication</topic><topic>Batteries</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Ecosystems</topic><topic>EMAP</topic><topic>LMAP</topic><topic>M2MAP</topic><topic>Prototypes</topic><topic>Radiofrequency identification</topic><topic>RFID security</topic><topic>RFID tags</topic><topic>Security</topic><topic>Wireless application protocol</topic><toplevel>online_resources</toplevel><creatorcontrib>Yousuf, Y.</creatorcontrib><creatorcontrib>Potdar, V.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yousuf, Y.</au><au>Potdar, V.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Survey of RFID Authentication Protocols</atitle><btitle>22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)</btitle><stitle>AINAW</stitle><date>2008-01-01</date><risdate>2008</risdate><spage>1346</spage><epage>1350</epage><pages>1346-1350</pages><isbn>0769530966</isbn><isbn>9780769530963</isbn><abstract>RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP and M2MAP.</abstract><pub>IEEE</pub><doi>10.1109/WAINA.2008.214</doi><tpages>5</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0769530966 |
ispartof | 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008), 2008, p.1346-1350 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4483106 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Batteries Cryptographic protocols Cryptography Ecosystems EMAP LMAP M2MAP Prototypes Radiofrequency identification RFID security RFID tags Security Wireless application protocol |
title | A Survey of RFID Authentication Protocols |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T10%3A33%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Survey%20of%20RFID%20Authentication%20Protocols&rft.btitle=22nd%20International%20Conference%20on%20Advanced%20Information%20Networking%20and%20Applications%20-%20Workshops%20(aina%20workshops%202008)&rft.au=Yousuf,%20Y.&rft.date=2008-01-01&rft.spage=1346&rft.epage=1350&rft.pages=1346-1350&rft.isbn=0769530966&rft.isbn_list=9780769530963&rft_id=info:doi/10.1109/WAINA.2008.214&rft_dat=%3Cieee_6IE%3E4483106%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4483106&rfr_iscdi=true |