RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Improving the efficiency of RFID authentication with pre-computation
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
Hi-index | 0.00 |
RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production, RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP, and M2MAP.