Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/13574
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kurt, Işıl | - |
dc.contributor.author | Alagöz, Fatih | - |
dc.contributor.author | Akgün, Mete | - |
dc.date.accessioned | 2023-07-27T19:49:53Z | - |
dc.date.available | 2023-07-27T19:49:53Z | - |
dc.date.issued | 2023 | - |
dc.identifier.issn | 1389-1286 | - |
dc.identifier.issn | 1872-7069 | - |
dc.identifier.uri | https://doi.org/10.1016/j.comnet.2023.109793 | - |
dc.identifier.uri | https://hdl.handle.net/11147/13574 | - |
dc.description.abstract | Radio Frequency Identification (RFID) technology is commonly used for tracking and identifying objects. However, this technology poses serious security and privacy concerns for individuals carrying the tags. To address these issues, various security protocols have been proposed. Unfortunately, many of these solutions suffer from scalability problems, requiring the back-end server to work linearly in the number of tags for a single tag identification. Some protocols offer O(1) or O(log n) identification complexity but are still susceptible to serious attacks. Few protocols consider attacks on the reader-side. Our proposed RFID authentication protocol eliminates the need for a search in the back-end and leverages Physically Unclonable Functions (PUFs) to securely store tag secrets, making it resistant to tag corruption attacks. It provides constant-time identification without sacrificing privacy and offers log2 n times better identification performance than the state-of-the-art protocol. It ensures destructive privacy for tag holders in the event of reader corruption without any conditions. Furthermore, it enables offline readers to maintain destructive privacy in case of corruption. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.relation.ispartof | Computer Networks | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | RFID | en_US |
dc.subject | Security | en_US |
dc.subject | Privacy | en_US |
dc.subject | PUFs | en_US |
dc.title | Scalable RFID authentication protocol based on physically unclonable functions | en_US |
dc.type | Article | en_US |
dc.institutionauthor | Akgün, Mete | tr |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.volume | 230 | en_US |
dc.identifier.wos | WOS:000998486800001 | en_US |
dc.identifier.scopus | 2-s2.0-85154615554 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | tr |
dc.identifier.doi | 10.1016/j.comnet.2023.109793 | - |
dc.authorscopusid | 58209824800 | - |
dc.authorscopusid | 6602940123 | - |
dc.authorscopusid | 26021030000 | - |
dc.identifier.scopusquality | Q1 | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | embargo_20250101 | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Article | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
1-s2.0-S1389128623002384-main.pdf Until 2025-01-01 | 1.05 MB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
1
checked on Nov 15, 2024
Page view(s)
120
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.