Survey on prominent RFID authentication protocols for passive tags

36Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

Abstract

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.

Cite

CITATION STYLE

APA

Baashirah, R., & Abuzneid, A. (2018, October 22). Survey on prominent RFID authentication protocols for passive tags. Sensors (Switzerland). MDPI AG. https://doi.org/10.3390/s18103584

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free