Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud

Article English OPEN
Qingkuan Dong; Jiaqing Tong; Yuan Chen;

With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of ... View more
  • References (16)
    16 references, page 1 of 2

    Wei, C.-H., Hwang, M.-S., Chin, A. Y.-H.. A mutual authentication protocol for RFID. IT Professional. 2011; 13 (2): 20-24

    Dong, Q., Zhang, J., Wei, L.. A SHA-3 based RFID mutual authentication protocol and its implementation.

    He, D., Kumar, N., Chilamkurti, N.. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. Journal of Medical Systems. 2014; 38, article 116

    Lee, C.-F., Chien, H.-Y., Laih, C.-S.. Server-less RFID authentication and searching protocol with enhanced security. International Journal of Communication Systems. 2012; 25 (3): 376-385

    Hoque, M. E., Rahman, F., Ahamed, S. I., Park, J. H.. Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments. Wireless Personal Communications. 2010; 55 (1): 65-79

    Tan, C., Sheng, B., Li, Q.. Secure and server-less RFID authentication and search protocols. IEEE Transactions on Wireless Communications. 2008; 7 (4): 1400-1407

    Dabas, C., Gupta, J. P.. A cloud computing architecture framework for scalable RFID. : 441-444

    Yuan, Z.-W., Li, Q.. Research on data processing of RFID middleware based on cloud computing. : 663-671

    Chattopadhyay, A., Prabhu, B. S., Gadh, R.. Web based RFID asset management solution established on cloud services. : 292-299

    Chu, L., Wu, S.-J.. An integrated building fire evacuation system with RFID and cloud computing. : 17-20

  • Metrics
Share - Bookmark