A survey of RFID authentication protocols
RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) I...
Main Authors: | , |
---|---|
Format: | Conference Paper |
Published: |
IEEE Computer Society
2008
|
Online Access: | http://hdl.handle.net/20.500.11937/20692 |
id |
curtin-20.500.11937-20692 |
---|---|
recordtype |
eprints |
spelling |
curtin-20.500.11937-206922017-09-13T15:56:52Z A survey of RFID authentication protocols Yousuf, Y. Potdar, Vidyasagar RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study two main RFID authentication protocols namely LMAP and M2MAP 2008 Conference Paper http://hdl.handle.net/20.500.11937/20692 10.1109/WAINA.2008.214 IEEE Computer Society fulltext |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
Curtin University Malaysia |
building |
Curtin Institutional Repository |
collection |
Online Access |
description |
RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study two main RFID authentication protocols namely LMAP and M2MAP |
format |
Conference Paper |
author |
Yousuf, Y. Potdar, Vidyasagar |
spellingShingle |
Yousuf, Y. Potdar, Vidyasagar A survey of RFID authentication protocols |
author_facet |
Yousuf, Y. Potdar, Vidyasagar |
author_sort |
Yousuf, Y. |
title |
A survey of RFID authentication protocols |
title_short |
A survey of RFID authentication protocols |
title_full |
A survey of RFID authentication protocols |
title_fullStr |
A survey of RFID authentication protocols |
title_full_unstemmed |
A survey of RFID authentication protocols |
title_sort |
survey of rfid authentication protocols |
publisher |
IEEE Computer Society |
publishDate |
2008 |
url |
http://hdl.handle.net/20.500.11937/20692 |
first_indexed |
2018-09-06T20:12:08Z |
last_indexed |
2018-09-06T20:12:08Z |
_version_ |
1610890324428718080 |