{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:42:11Z","timestamp":1753274531448,"version":"3.37.3"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Tabuk University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2954413","type":"journal-article","created":{"date-parts":[[2019,11,19]],"date-time":"2019-11-19T15:52:23Z","timestamp":1574178743000},"page":"168337-168356","source":"Crossref","is-referenced-by-count":5,"title":["Prototype Device With Lightweight Protocol for Secure RFID Communication Without Reliable Connectivity"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1249-6424","authenticated-orcid":false,"given":"Ahmed","family":"Alamer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9519-886X","authenticated-orcid":false,"given":"Ben","family":"Soh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6613-6822","authenticated-orcid":false,"given":"Ahmed H.","family":"Alahmadi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5572-7176","authenticated-orcid":false,"given":"David E.","family":"Brumbaugh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.05.007"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5084636"},{"key":"ref71","first-page":"85","article-title":"Cryptanalysis of ring-LWE based key exchange with key share reuse","volume":"2016","author":"fluhrer","year":"2016","journal-title":"IACR Cryptology ePrint"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2016.02.020"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_26"},{"key":"ref77","first-page":"1","article-title":"New methods for cost-effective side-channel attacks on cryptographic RFIDs","author":"kasper","year":"2009","journal-title":"Proc Workshop RFID Security"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2808062.2808073"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"28","DOI":"10.3390\/s17010028","article-title":"Reverse engineering and security evaluation of commercial tags for RFID-based IoT applications","volume":"17","author":"fern\u00e1ndez-caram\u00e9s","year":"2017","journal-title":"SENSORS"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_6"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"journal-title":"Share a Secret&#x2014;One Time","year":"2019","key":"ref78"},{"article-title":"Generating hardware security logic","year":"2019","author":"oberg","key":"ref79"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888033"},{"key":"ref32","first-page":"1","article-title":"Integrating Internet of Things and EHealth solutions for students&#x2019; healthcare","volume":"1","author":"takpor","year":"2015","journal-title":"Proc World Congr Eng"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2886624"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730781"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.08.009"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2806483"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2789329"},{"journal-title":"MIFARE Classic 4K Contactless Smart Card","year":"2019","key":"ref60"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_21"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7081-3"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8376"},{"article-title":"The stream cipher MICKEY 2.0","year":"2006","author":"babbage","key":"ref28"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2013.050732"},{"key":"ref27","first-page":"52","article-title":"On ciphers that continuously access the non-volatile key","author":"mikhalev","year":"2016","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2016.02.006"},{"journal-title":"The Highest Quality in Fingerprint Biometrics at Affordable Prices","year":"2019","key":"ref66"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s18124444"},{"journal-title":"MFRC522 Standard performance MIFARE and NTAG frontend","year":"2019","key":"ref67"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"katz","key":"ref68"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1399"},{"journal-title":"Fridge Sends Spam Emails","year":"2019","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625099"},{"journal-title":"Lightweight Cryptography for the Internet of Things","year":"2008","author":"katagi","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13858-4_4"},{"journal-title":"State of the art in lightweight symmetric cryptography","year":"2017","author":"biryukov","key":"ref21"},{"key":"ref24","first-page":"179","article-title":"Impossible differential cryptanalysis of reduced-round Lblock","author":"karako\u00e7","year":"2012","journal-title":"Information Security Theory and Practice Security Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_19"},{"journal-title":"Hardware Evaluation of eSTREAM Candidate Algorithms","year":"2019","author":"gurkaynak","key":"ref26"},{"key":"ref25","first-page":"1","article-title":"A family of lightweight block ciphers based on DES suited for RFID applications","volume":"6","author":"poschmann","year":"2006","journal-title":"Proc Workshop RFID Security"},{"article-title":"Flash EEPROM system","year":"1994","author":"harari","key":"ref50"},{"article-title":"Side-channel attack detection using hardware performance counters","year":"2019","author":"chen","key":"ref51"},{"year":"2019","key":"ref59"},{"journal-title":"Fingerprint Reader User Guide","year":"2019","key":"ref58"},{"journal-title":"&#x2018;Adafruit Pitft&#x2014; $320\\times 240\\ \\ 2 8$ &#x2019; TFT+Touchscreen for Raspberry Pi","year":"2019","key":"ref57"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5334\/joh.9"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2019.8662009"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0080"},{"journal-title":"Raspberry Pi User Guide","year":"2014","author":"upton","key":"ref53"},{"article-title":"Cryptographic unit for public key infrastructure (PKI) operations","year":"2018","author":"nix","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2017.2776302"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2698019"},{"journal-title":"Privacy by Design The 7 Foundational Principles","year":"2009","author":"cavoukian","key":"ref40"},{"journal-title":"The eSTREAM portfolio page","year":"2019","key":"ref12"},{"key":"ref13","first-page":"1","article-title":"End-to-end data security for IoT: From a cloud of encryptions to encryption in the cloud","author":"canteaut","year":"2017","journal-title":"Proc IEEE Conf (Cesar)"},{"key":"ref14","first-page":"32","article-title":"IoT security: Performance evaluation of grain, MICKEY, and trivium-lightweight stream ciphers","author":"ertaul","year":"2017","journal-title":"Proc Int Conf Secur Manage (SAM)"},{"article-title":"Some studies on selected stream cipher, analysis, fault attack & related results","year":"2015","author":"banik","key":"ref15"},{"article-title":"Improved differential fault attack on MICKEY 2.0","year":"2013","author":"banik","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730835"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISNE.2014.6839375"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2017.1384917"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632651"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.7763\/IJCEE.2011.V3.306"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-07-2014-0173"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1201\/b16885"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SSD.2018.8570558"},{"journal-title":"USB 16GB (Encrypted USB3 0 Flash Drive (256-Bit AES Encryption)","year":"2019","key":"ref49"},{"key":"ref9","first-page":"266","article-title":"Authenticated key exchange for SIDH","volume":"2018","author":"galbraith","year":"2018","journal-title":"IACR Cryptology ePrint"},{"key":"ref46","first-page":"333","article-title":"Replacing personally-identifying information in medical records, the scrub system","author":"sweeney","year":"1996","journal-title":"Proc Amer Med Inf Assoc Annu Fall Symp"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1071\/WR18013"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICICICT.2014.6781243"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0077-2"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/4236.807015"},{"journal-title":"Encyclopedia of Cryptography and Security","year":"2014","author":"van tilborg","key":"ref41"},{"key":"ref44","first-page":"208","article-title":"Centralized key distribution using quantum cryptography","volume":"6","author":"singh","year":"2017","journal-title":"Int J Comput Sci Mob Comput"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2778751"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08905992.pdf?arnumber=8905992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:32:15Z","timestamp":1641987135000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8905992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":79,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2954413","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}