![]() Vulnerability analysis of elliptic curve cryptography-based rfid authentication protocols. Pervasive and Mobile Computing, 24, 210–223. Secure authentication scheme for iot and cloud servers. In International conference on network-based information systems, 2009, NBIS’09 (pp. Security analysis of ultra-lightweight cryptographic protocol for low-cost rfid tags: Gossamer protocol. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.īilal, Z., Masood, A., & Kausar, F. Sasi: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. A lightweight authentication and key agreement scheme for internet of drones. A smart and secure logistics system based on IoT and cloud technologies. Peer-to-Peer Networking and Applications, 10(2), 368–376. An ultra-lightweight rfid authentication scheme for mobile commerce. ![]() An authentication protocol to track an object with multiple RFID tags using cloud computing environment. 1–16Īnandhi, S., Anitha, R., & Sureshkumar, V. Security Enhanced RFID Authentication Protocols for Healthcare Environment. Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains. Rodrigues (2019) Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet of Things Journal, 5(1), 269–282. Design of secure user authenticated key management protocol for generic IoT networks. K., Odelu, V., Kumar, N., Conti, M., & Jo, M. IEEE Transaction of Industrial Information, 14(8), 3599–3609. A robust ECC-based provable secure authentication protocol with privacy protection for industrial internet of things. International Journal of Logistics Research and Applications, pp. Smart logistics based on the internet of things technology: an overview. Concurrency and Computation: Practice and Experience, p. Solving the last mile problem in logistics: A mobile edge computing and blockchain-based unmanned aerial vehicle delivery system. ![]() Li, X., Gong, L., Liu, X., Jiang, F., Shi, W., Fan, L., and Xu, J. Journal of Industrial Information Integration, p. A review of logistics internet-of-things: Current trends and scope for future research. The performance evaluation results demonstrate promising findings for this scheme as compared to other studies. The proposed scheme supports 19% more security features in comparison with other contemporary schemes. ![]() We analyze and validate the contributed model using formal security analysis based on random oracle model. and other recently presented logistics and supply chain-based authenticated key agreements, we propose a new 5G enabled secure RFID authentication scheme for smart logistics. Considering the limitations in Anandhi et al. We ascertain that these schemes lack mutual authenticity and resistance to other forgery attacks. Recently, a few lightweight authentication protocols for object tracking and logistics including Anandhi et al. This requires the underlying protocols responsible for authenticating the entities in supply chain, to be secure as well as efficient. Besides, the smart devices exchanging data are deficient in power and require energy friendly communication protocols. However, only technological advances are not enough until all intermediaries in the process of supply chain are reliable. The realization of the concept of smart logistics includes the real-time communication and object tracking through 5G-oriented Internet of Things (IoT) and Information Communication Technology (ICT)-based smart devices. It not only assists in delivering the low cost services to the subscribers but also helps in bringing transparency in the supply chain management system with the creation of interactive ecosystem encompassing IoT, RFID and sensor-based objects. Smart logistics play a crucial role for rapid industrialization and economic development of the countries.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |