{"id":"https://openalex.org/W4317815240","doi":"https://doi.org/10.1109/access.2023.3239530","title":"MDS Code Based Ultralightweight Authentication Protocol for RFID System","display_name":"MDS Code Based Ultralightweight Authentication Protocol for RFID System","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4317815240","doi":"https://doi.org/10.1109/access.2023.3239530"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3239530","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10024948.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10024948.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004439323","display_name":"Pramod Kumar Maurya","orcid":"https://orcid.org/0000-0002-9413-467X"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pramod Kumar Maurya","raw_affiliation_strings":["School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050469642","display_name":"Haradhan Ghosh","orcid":"https://orcid.org/0000-0001-5610-8596"},"institutions":[{"id":"https://openalex.org/I155837530","display_name":"National Institute of Technology Durgapur","ror":"https://ror.org/04ds0jm32","country_code":"IN","type":"education","lineage":["https://openalex.org/I155837530"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Haradhan Ghosh","raw_affiliation_strings":["Department of Mathematics, National Institute of Technology at Durgapur, Durgapur, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, National Institute of Technology at Durgapur, Durgapur, India","institution_ids":["https://openalex.org/I155837530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019533427","display_name":"Satya Bagchi","orcid":"https://orcid.org/0000-0001-7588-9973"},"institutions":[{"id":"https://openalex.org/I155837530","display_name":"National Institute of Technology Durgapur","ror":"https://ror.org/04ds0jm32","country_code":"IN","type":"education","lineage":["https://openalex.org/I155837530"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Satya Bagchi","raw_affiliation_strings":["Department of Mathematics, National Institute of Technology at Durgapur, Durgapur, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, National Institute of Technology at Durgapur, Durgapur, India","institution_ids":["https://openalex.org/I155837530"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"fwci":1.418,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":4,"citation_normalized_percentile":{"value":0.999831,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":88,"max":90},"biblio":{"volume":"11","issue":null,"first_page":"10563","last_page":"10577"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10069","display_name":"Antenna Design and Analysis","score":0.9859,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reflection-attack","display_name":"Reflection attack","score":0.6362622},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.559114},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.49851394},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.4507631}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8506667},{"id":"https://openalex.org/C91069110","wikidata":"https://www.wikidata.org/wiki/Q1919060","display_name":"Reflection attack","level":5,"score":0.6362622},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6251123},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.56180066},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.559114},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.49851394},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48469666},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4784144},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.47816545},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.47107},{"id":"https://openalex.org/C124086997","wikidata":"https://www.wikidata.org/wiki/Q4053131","display_name":"Wide Mouth Frog protocol","level":5,"score":0.4689089},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.46847975},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4507631},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44780952},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.38125288},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34791654},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28506362},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.28119528},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13467827},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.105951786},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3239530","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10024948.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3239530","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10024948.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.41}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":42,"referenced_works":["https://openalex.org/W1496535307","https://openalex.org/W1501377203","https://openalex.org/W1965515427","https://openalex.org/W1981857788","https://openalex.org/W2028915867","https://openalex.org/W2039942714","https://openalex.org/W2093422627","https://openalex.org/W2105017410","https://openalex.org/W2110463868","https://openalex.org/W2144298891","https://openalex.org/W2430093443","https://openalex.org/W2493731532","https://openalex.org/W2516089876","https://openalex.org/W2574005192","https://openalex.org/W2605624447","https://openalex.org/W2618912662","https://openalex.org/W2732131698","https://openalex.org/W2753858914","https://openalex.org/W2775758566","https://openalex.org/W2803896747","https://openalex.org/W2887736592","https://openalex.org/W2888600439","https://openalex.org/W2957682351","https://openalex.org/W2964201584","https://openalex.org/W2966078947","https://openalex.org/W2966593378","https://openalex.org/W2978725006","https://openalex.org/W3000070452","https://openalex.org/W3014409064","https://openalex.org/W3045885556","https://openalex.org/W3123297528","https://openalex.org/W3133499994","https://openalex.org/W3175469749","https://openalex.org/W3185951729","https://openalex.org/W3199380764","https://openalex.org/W3216361649","https://openalex.org/W4213144751","https://openalex.org/W4248289108","https://openalex.org/W4280634997","https://openalex.org/W4285114535","https://openalex.org/W74348556","https://openalex.org/W82871476"],"related_works":["https://openalex.org/W3062067791","https://openalex.org/W3045615609","https://openalex.org/W2943967608","https://openalex.org/W2911056119","https://openalex.org/W2490834464","https://openalex.org/W2406792259","https://openalex.org/W2388928260","https://openalex.org/W2375968705","https://openalex.org/W2362358462","https://openalex.org/W1533220993"],"abstract_inverted_index":{"Privacy":[0],"and":[1,45,59,80,99,125],"security":[2,46,101,120,130],"are":[3],"central":[4],"issues":[5],"in":[6],"the":[7,32,104,129,133,138,142,150,155,165,173],"deployment":[8],"of":[9,35,103,132,141,152,154],"an":[10,51,86],"RFID":[11],"system.":[12],"It":[13],"is":[14,176],"vulnerable":[15],"to":[16,31,41,70,127,163],"several":[17],"attacks,":[18,22],"such":[19],"as":[20],"replay":[21],"location":[23],"tracking,":[24],"man-in-middle":[25],"attack,":[26,28],"de-synchronization":[27],"etc.,":[29],"due":[30],"inherent":[33],"weaknesses":[34],"underlying":[36],"wireless":[37],"communications.":[38],"In":[39,115],"order":[40],"tackle":[42],"these":[43],"privacy":[44,153],"concerns,":[47],"this":[48],"paper":[49],"presents":[50],"ultralightweight":[52,87],"authentication":[53],"protocol":[54,88,106,111,121,144,175],"based":[55],"on":[56],"group":[57,67],"homomorphism":[58,68],"maximum":[60],"distance":[61],"separable":[62],"(MDS)":[63],"code.":[64],"We":[65,84,136],"use":[66,118,159],"properties":[69,92],"make":[71],"a":[72,179],"server":[73],"lookup":[74],"table":[75],"that":[76,93,108,172],"reduces":[77],"searching":[78],"complexity":[79],"overcomes":[81],"scalability":[82],"issues.":[83],"develop":[85],"using":[89,145],"MDS":[90],"code":[91],"employs":[94],"only":[95],"bit-wise":[96],"operators.":[97],"Formal":[98],"informal":[100],"analysis":[102,170],"proposed":[105,110,134,143,156,166,174],"shows":[107],"our":[109],"resists":[112],"various":[113],"attacks.":[114],"addition,":[116],"we":[117,158],"automated":[119],"verification":[122],"tools,":[123],"AVISPA":[124],"Scyther,":[126],"validate":[128],"features":[131],"protocol.":[135,167],"demonstrate":[137],"correctness":[139],"proof":[140],"BAN":[146],"logic.":[147],"To":[148],"measure":[149],"level":[151],"protocol,":[157],"two":[160],"benchmark":[161],"metrics":[162],"simulate":[164],"The":[168],"performance":[169],"indicates":[171],"efficient":[177],"for":[178],"low-cost":[180],"environment.":[181]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4317815240","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-01-05T07:10:54.628473","created_date":"2023-01-24"}