{"id":"https://openalex.org/W4405844675","doi":"https://doi.org/10.1109/jiot.2024.3523390","title":"A Lightweight Authentication Protocol for RFID-Assisted Supply Chain Management System","display_name":"A Lightweight Authentication Protocol for RFID-Assisted Supply Chain Management System","publication_year":2024,"publication_date":"2024-12-27","ids":{"openalex":"https://openalex.org/W4405844675","doi":"https://doi.org/10.1109/jiot.2024.3523390"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3523390","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3523390","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027986369","display_name":"Tayyaba Tariq","orcid":"https://orcid.org/0000-0003-1555-0147"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Tayyaba Tariq","raw_affiliation_strings":["Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan"],"raw_orcid":"https://orcid.org/0000-0003-1555-0147","affiliations":[{"raw_affiliation_string":"Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109037137","display_name":"Wen\u2010Chung Kuo","orcid":"https://orcid.org/0000-0003-0408-8663"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Wen-Chung Kuo","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology, Douliu, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology, Douliu, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023371922","display_name":"Khalid Mahmood","orcid":"https://orcid.org/0000-0001-5046-7766"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Khalid Mahmood","raw_affiliation_strings":["Graduate School of Intelligent Data Science, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan"],"raw_orcid":"https://orcid.org/0000-0001-5046-7766","affiliations":[{"raw_affiliation_string":"Graduate School of Intelligent Data Science, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017367371","display_name":"Salman Shamshad","orcid":"https://orcid.org/0000-0002-8984-3199"},"institutions":[{"id":"https://openalex.org/I142204992","display_name":"University of Lahore","ror":"https://ror.org/051jrjw38","country_code":"PK","type":"education","lineage":["https://openalex.org/I142204992"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Salman Shamshad","raw_affiliation_strings":["Department of Software Engineering, The University of Lahore, Lahore, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-8984-3199","affiliations":[{"raw_affiliation_string":"Department of Software Engineering, The University of Lahore, Lahore, Pakistan","institution_ids":["https://openalex.org/I142204992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India","Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"],"raw_orcid":"https://orcid.org/0000-0002-5196-9589","affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]},{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075968009","display_name":"Mohammed J. F. Alenazi","orcid":"https://orcid.org/0000-0001-6593-112X"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed J. F. Alenazi","raw_affiliation_strings":["Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","Department of Computer Engineering, College of Computer and Information Sciences (CCIS), King Saud University, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-6593-112X","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Computer Engineering, College of Computer and Information Sciences (CCIS), King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5027986369"],"corresponding_institution_ids":["https://openalex.org/I75357094"],"apc_list":null,"apc_paid":null,"fwci":1.4885,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.8538253,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"12","issue":"9","first_page":"12845","last_page":"12852"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9187999963760376,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7548860311508179},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6737545728683472},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6694042682647705},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.614907443523407},{"id":"https://openalex.org/keywords/supply-chain-management","display_name":"Supply chain management","score":0.5738775730133057},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5726702809333801},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.4424087703227997},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4188944697380066},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36999040842056274},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1110268235206604}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7548860311508179},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6737545728683472},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6694042682647705},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.614907443523407},{"id":"https://openalex.org/C44104985","wikidata":"https://www.wikidata.org/wiki/Q492886","display_name":"Supply chain management","level":3,"score":0.5738775730133057},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5726702809333801},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.4424087703227997},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4188944697380066},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36999040842056274},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1110268235206604},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3523390","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3523390","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4886921666","display_name":null,"funder_award_id":"SPD2024R582","funder_id":"https://openalex.org/F4320321145","funder_display_name":"King Saud University"},{"id":"https://openalex.org/G8416384998","display_name":null,"funder_award_id":"NSTC 113-2221-E-224-064","funder_id":"https://openalex.org/F4320331164","funder_display_name":"National Science and Technology Council"}],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"},{"id":"https://openalex.org/F4320331164","display_name":"National Science and Technology Council","ror":"https://ror.org/00wnb9798"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1526070463","https://openalex.org/W1561441787","https://openalex.org/W2029693536","https://openalex.org/W2096356985","https://openalex.org/W2243569459","https://openalex.org/W2733306512","https://openalex.org/W2766472919","https://openalex.org/W3021263641","https://openalex.org/W3178457697","https://openalex.org/W4285176799","https://openalex.org/W4309080718","https://openalex.org/W4313855816","https://openalex.org/W4322626618","https://openalex.org/W4401075185"],"related_works":["https://openalex.org/W2983500849","https://openalex.org/W3024999678","https://openalex.org/W388184414","https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W2054202867","https://openalex.org/W1965515427","https://openalex.org/W2116285675"],"abstract_inverted_index":{"In":[0],"the":[1,8,25,41,44,63,70,74,103,142,145,153,158,176,188,223,250],"evolving":[2],"landscape":[3],"of":[4,10,27,46,67,105,135,157,222],"supply":[5,33,71,83,129],"chain":[6,34,84,130],"management,":[7,35],"integration":[9],"radio-frequency":[11],"identification":[12],"(RFID)":[13],"technology":[14,50],"has":[15,22],"marked":[16],"a":[17,28,136,200,229,237],"significant":[18],"milestone.":[19],"This":[20],"development":[21],"led":[23],"to":[24,54,98,109,117,245],"emergence":[26],"new":[29],"system":[30,146],"in":[31,43,69,233,240,243],"RFID-based":[32,125],"which":[36],"is":[37,173],"intricately":[38],"linked":[39],"with":[40,203],"advances":[42],"Internet":[45],"Things":[47],"(IoT).":[48],"RFID":[49,78,80],"employs":[51],"electromagnetic":[52],"fields":[53],"identify":[55],"and":[56,61,65,82,89,155,163,193,216,236,254],"track":[57],"tags":[58],"on":[59,207],"objects":[60],"revolutionizes":[62],"management":[64,131],"tracking":[66],"items":[68],"chain.":[72],"However,":[73,102],"public":[75],"communication":[76,212,241],"among":[77],"tags,":[79],"readers,":[81],"infrastructure":[85],"predominantly":[86],"escalates":[87],"security":[88,111,154,165,171,184,195,218],"privacy":[90],"challenges.":[91,101],"Several":[92],"authentication":[93,126],"protocols":[94,108],"have":[95],"been":[96],"proposed":[97,107],"overcome":[99],"these":[100,119],"vulnerability":[104],"most":[106],"numerous":[110],"attacks":[112],"renders":[113],"them":[114],"inefficient.":[115],"Therefore,":[116],"address":[118],"crucial":[120],"challenges,":[121],"we":[122,198],"devised":[123,159,189],"an":[124],"protocol":[127,143,190],"for":[128],"systems.":[132],"The":[133,169,182,220],"incorporation":[134],"physically":[137],"unclonable":[138],"function":[139],"(PUF)":[140],"into":[141],"fortifies":[144],"against":[147],"physical":[148],"tampering":[149],"attacks.":[150],"To":[151],"validate":[152],"effectiveness":[156],"protocol,":[160],"both":[161],"informal":[162,183],"formal":[164,170],"analysis":[166,172,185,202,225],"are":[167,226],"conducted.":[168],"conducted":[174],"using":[175],"widely":[177],"used":[178],"random":[179],"oracle":[180],"model.":[181],"reveals":[186],"that":[187],"provides":[191],"enhanced":[192],"efficient":[194],"features.":[196,219],"Furthermore,":[197],"perform":[199],"comparative":[201,224],"related":[204,246],"protocols,":[205,247],"focusing":[206],"critical":[208],"performance":[209,253],"metrics":[210],"like":[211],"cost,":[213,215],"computation":[214],"overall":[217],"results":[221],"promising,":[227],"indicating":[228],"substantial":[230],"30.92%":[231],"reduction":[232,239],"computational":[234],"cost":[235,242],"23.98%":[238],"comparison":[244],"thus":[248],"highlighting":[249],"protocol\u2019s":[251],"superior":[252],"resource":[255],"efficiency.":[256]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":2}],"updated_date":"2026-05-15T08:27:34.491423","created_date":"2025-10-10T00:00:00"}
