{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:05:31Z","timestamp":1775253931812,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030029210","type":"print"},{"value":"9783030029227","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02922-7_8","type":"book-chapter","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T05:42:24Z","timestamp":1539927744000},"page":"111-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Improved Lightweight RFID Authentication Protocol for Internet of Things"],"prefix":"10.1007","author":[{"given":"Xu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xun","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Yali","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[]},{"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,20]]},"reference":[{"issue":"15","key":"8_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"8_CR2","unstructured":"BlueKrypt: Nist key length recommended (2016). https:\/\/www.keylength.com\/en\/4\/"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-89641-8_11","volume-title":"Cryptology and Network Security","author":"J Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 149\u2013161. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89641-8_11"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Burmester, M., De Medeiros, B., Motta, R.: Robust, anonymous RFID authentication with constant key-lookup. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, pp. 283\u2013291. ACM (2008)","DOI":"10.1145\/1368310.1368351"},{"issue":"2","key":"8_CR5","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"HY Chien","year":"2007","unstructured":"Chien, H.Y., Chen, C.H.: Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Comput. Stand. Interfaces 29(2), 254\u2013259 (2007)","journal-title":"Comput. Stand. Interfaces"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.comcom.2010.02.029","volume":"34","author":"JS Cho","year":"2011","unstructured":"Cho, J.S., Yeo, S.S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391\u2013397 (2011)","journal-title":"Comput. Commun."},{"key":"8_CR7","unstructured":"van Deursen, T., Radomirovic, S.: Untraceable RFID protocols are not trivially composable: attacks on the revision of ec-rac. IACR Cryptology ePrint Archive 2009, 332 (2009)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357\u2013370. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_26"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Gaubatz, G., Kaps, J.P., Ozturk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops, pp. 146\u2013150. IEEE (2005)","DOI":"10.1109\/PERCOMW.2005.76"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.cose.2015.05.004","volume":"55","author":"P Gope","year":"2015","unstructured":"Gope, P., Hwang, T.: A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput. Secur. 55, 271\u2013280 (2015)","journal-title":"Comput. Secur."},{"issue":"10","key":"8_CR11","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s10916-014-0116-z","volume":"38","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Chilamkurti, N., Lee, J.H.: Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10), 116 (2014)","journal-title":"J. Med. Syst."},{"issue":"2","key":"8_CR12","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"8_CR13","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in e-passports. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 74\u201388. IEEE (2005)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Kaur, K., Kumar, N., Singh, M., Obaidat, M.S.: Lightweight authentication protocol for RFID-enabled systems based on ECC. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/GLOCOM.2016.7841955"},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.adhoc.2007.12.004","volume":"7","author":"SV Kaya","year":"2009","unstructured":"Kaya, S.V., Sava\u015f, E., Levi, A., Er\u00e7etin, \u00d6.: Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Netw. 7(1), 136\u2013152 (2009)","journal-title":"Ad Hoc Netw."},{"issue":"4","key":"8_CR16","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 IEEE International Conference on RFID, pp. 97\u2013104. IEEE (2008)","DOI":"10.1109\/RFID.2008.4519370"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Batina, L., Verbauwhede, I.: Untraceable RFID authentication protocols: revision of EC-RAC. In: 2009 IEEE International Conference on RFID, pp. 178\u2013185. IEEE (2009)","DOI":"10.1145\/1741866.1741877"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.adhoc.2013.02.004","volume":"18","author":"YP Liao","year":"2014","unstructured":"Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18, 133\u2013146 (2014)","journal-title":"Ad Hoc Netw."},{"issue":"7","key":"8_CR20","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1002\/ett.2514","volume":"23","author":"C Lv","year":"2012","unstructured":"Lv, C., Li, H., Ma, J., Zhang, Y.: Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols. Trans. Emerg. Telecommun. Technol. 23(7), 618\u2013624 (2012)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11915034_59","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"P Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006. LNCS, vol. 4277, pp. 352\u2013361. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11915034_59"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Est\u00e9vez-Tapiador, J.M., Ribagorda, A.: LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of 2nd Workshop on RFID Security, p. 06 (2006)","DOI":"10.1007\/11833529_93"},{"issue":"4","key":"8_CR23","doi-asserted-by":"publisher","first-page":"5253","DOI":"10.1007\/s11277-016-3739-1","volume":"96","author":"H Shen","year":"2017","unstructured":"Shen, H., Shen, J., Khan, M.K., Lee, J.H.: Efficient RFID authentication using elliptic curve cryptography for the Internet of Things. Wirel. Pers. Commun. 96(4), 5253\u20135266 (2017)","journal-title":"Wirel. Pers. Commun."},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Tan, L., Wang, N.: Future internet: the Internet of Things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 5, p. V5-376. IEEE (2010)","DOI":"10.1109\/ICACTE.2010.5579543"},{"issue":"4","key":"8_CR25","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"LD Xu","year":"2014","unstructured":"Xu, L.D., He, W., Li, S.: Internet of Things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233\u20132243 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"12","key":"8_CR26","doi-asserted-by":"publisher","first-page":"7678","DOI":"10.1016\/j.eswa.2010.04.074","volume":"37","author":"TC Yeh","year":"2010","unstructured":"Yeh, T.C., Wang, Y.J., Kuo, T.C., Wang, S.S.: Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert. Syst. Appl. 37(12), 7678\u20137683 (2010)","journal-title":"Expert. Syst. Appl."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02922-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:47:48Z","timestamp":1775249268000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02922-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030029210","9783030029227"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02922-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wise2018.connect.rs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}