{"id":"https://openalex.org/W2888373635","doi":"https://doi.org/10.3390/fi10090082","title":"On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems","display_name":"On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems","publication_year":2018,"publication_date":"2018-08-21","ids":{"openalex":"https://openalex.org/W2888373635","doi":"https://doi.org/10.3390/fi10090082","mag":"2888373635"},"language":"en","primary_location":{"id":"doi:10.3390/fi10090082","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi10090082","pdf_url":"https://www.mdpi.com/1999-5903/10/9/82/pdf?version=1534837444","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/10/9/82/pdf?version=1534837444","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036703361","display_name":"Masoumeh Safkhani","orcid":"https://orcid.org/0000-0002-1897-0828"},"institutions":[{"id":"https://openalex.org/I83123760","display_name":"Shahid Rajaee Teacher Training University","ror":"https://ror.org/02nkz4493","country_code":"IR","type":"education","lineage":["https://openalex.org/I83123760"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Masoumeh Safkhani","raw_affiliation_strings":["Computer Engineering Department, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran"],"raw_orcid":"https://orcid.org/0000-0002-1897-0828","affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran","institution_ids":["https://openalex.org/I83123760"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069794920","display_name":"Nasour Bagheri","orcid":"https://orcid.org/0000-0002-6818-5342"},"institutions":[{"id":"https://openalex.org/I4210146419","display_name":"Institute for Research in Fundamental Sciences","ror":"https://ror.org/04xreqs31","country_code":"IR","type":"facility","lineage":["https://openalex.org/I4210146419"]},{"id":"https://openalex.org/I83123760","display_name":"Shahid Rajaee Teacher Training University","ror":"https://ror.org/02nkz4493","country_code":"IR","type":"education","lineage":["https://openalex.org/I83123760"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Nasour Bagheri","raw_affiliation_strings":["Electrical Engineering Department, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran","School of Computer Science, Institute for Research in Fundamental Sciences (IPM), Tehran 19538-33511, Iran"],"raw_orcid":"https://orcid.org/0000-0002-6818-5342","affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran","institution_ids":["https://openalex.org/I83123760"]},{"raw_affiliation_string":"School of Computer Science, Institute for Research in Fundamental Sciences (IPM), Tehran 19538-33511, Iran","institution_ids":["https://openalex.org/I4210146419"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031835641","display_name":"Mahyar Shariat","orcid":"https://orcid.org/0000-0001-7932-7484"},"institutions":[{"id":"https://openalex.org/I83123760","display_name":"Shahid Rajaee Teacher Training University","ror":"https://ror.org/02nkz4493","country_code":"IR","type":"education","lineage":["https://openalex.org/I83123760"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mahyar Shariat","raw_affiliation_strings":["Computer Engineering Department, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran"],"raw_orcid":"https://orcid.org/0000-0001-7932-7484","affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran","institution_ids":["https://openalex.org/I83123760"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036703361"],"corresponding_institution_ids":["https://openalex.org/I83123760"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":1.0451,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.81902539,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"10","issue":"9","first_page":"82","last_page":"82"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8558129072189331},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.701702892780304},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6119204163551331},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.569513201713562},{"id":"https://openalex.org/keywords/reflection-attack","display_name":"Reflection attack","score":0.5348595380783081},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4986600875854492},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48342645168304443},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.48216480016708374},{"id":"https://openalex.org/keywords/radio-frequency-identification","display_name":"Radio-frequency identification","score":0.4716089367866516},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.46270492672920227},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.4472384452819824},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43954741954803467},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.35150277614593506},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.30361586809158325}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8558129072189331},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.701702892780304},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6119204163551331},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.569513201713562},{"id":"https://openalex.org/C91069110","wikidata":"https://www.wikidata.org/wiki/Q1919060","display_name":"Reflection attack","level":5,"score":0.5348595380783081},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4986600875854492},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48342645168304443},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.48216480016708374},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.4716089367866516},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.46270492672920227},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.4472384452819824},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43954741954803467},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.35150277614593506},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30361586809158325},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/fi10090082","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi10090082","pdf_url":"https://www.mdpi.com/1999-5903/10/9/82/pdf?version=1534837444","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:10:y:2018:i:9:p:82-:d:164832","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/10/9/82/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:763954a134594affa5581c677db836b2","is_oa":true,"landing_page_url":"https://doaj.org/article/763954a134594affa5581c677db836b2","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 10, Iss 9, p 82 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-5903/10/9/82/","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/fi10090082","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/fi10090082","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi10090082","pdf_url":"https://www.mdpi.com/1999-5903/10/9/82/pdf?version=1534837444","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2888373635.pdf","grobid_xml":"https://content.openalex.org/works/W2888373635.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1531357090","https://openalex.org/W1603878273","https://openalex.org/W1965515427","https://openalex.org/W2053254626","https://openalex.org/W2087928947","https://openalex.org/W2099841931","https://openalex.org/W2144298891","https://openalex.org/W2149736837","https://openalex.org/W2257350504","https://openalex.org/W2291322701","https://openalex.org/W2484909454","https://openalex.org/W2504919933","https://openalex.org/W2516089876","https://openalex.org/W2521061848","https://openalex.org/W2565777398","https://openalex.org/W2573616158","https://openalex.org/W2581555621","https://openalex.org/W2598993458","https://openalex.org/W2732131698","https://openalex.org/W2743288534","https://openalex.org/W2755191230","https://openalex.org/W2768036079","https://openalex.org/W2790942157","https://openalex.org/W2797795076","https://openalex.org/W2808182396","https://openalex.org/W2808947119","https://openalex.org/W2913399930","https://openalex.org/W6696704412","https://openalex.org/W6757730873"],"related_works":["https://openalex.org/W2377502939","https://openalex.org/W2406792259","https://openalex.org/W2217572265","https://openalex.org/W2972452708","https://openalex.org/W2367067697","https://openalex.org/W2915235342","https://openalex.org/W2363600212","https://openalex.org/W4232990054","https://openalex.org/W2362358462","https://openalex.org/W3045615609"],"abstract_inverted_index":{"Passive":[0],"Radio":[1],"Frequency":[2],"IDentification":[3],"(RFID)":[4],"tags":[5],"are":[6,149],"generally":[7],"highly":[8],"constrained":[9],"and":[10,89,175,178,194],"cannot":[11],"support":[12],"conventional":[13],"encryption":[14],"systems":[15],"to":[16,28],"meet":[17],"the":[18,30,44,57,64,99,111,118,125,132,143,146,185],"required":[19],"security.":[20],"Hence,":[21],"designers":[22],"of":[23,46,66,114,120,124,153],"security":[24,32,45,65,92],"protocols":[25,48],"may":[26],"try":[27],"achieve":[29],"desired":[31],"only":[33,121],"using":[34,53,76,180],"limited":[35],"ultra-lightweight":[36],"operations.":[37],"In":[38,56,127],"this":[39],"paper,":[40],"we":[41,62,96,129,158],"show":[42,90,97,130],"that":[43,71,98,131,184],"such":[47],"is":[49,102,188],"not":[50],"provided":[51],"by":[52],"rotation":[54,77],"functions.":[55],"following,":[58],"for":[59,83,168],"an":[60,67,84,150,169],"example,":[61],"investigate":[63],"RFID":[68,86],"authentication":[69,162],"protocol":[70,101,144,163,187],"has":[72,110],"been":[73],"recently":[74],"developed":[75],"function":[78],"named":[79,164],"ULRAS,":[80],"which":[81,166],"stands":[82,167],"Ultra-Lightweight":[85],"Authentication":[87,173],"Scheme":[88],"its":[91],"weaknesses.":[93],"More":[94],"precisely,":[95],"ULRAS":[100],"vulnerable":[103],"against":[104,142,190],"de-synchronization":[105],"attack.":[106],"The":[107],"given":[108,133],"attack":[109,134,141],"success":[112],"probability":[113],"almost":[115],"\u20181\u2019,":[116],"with":[117],"complexity":[119],"one":[122],"session":[123],"protocol.":[126],"addition,":[128],"can":[135],"be":[136],"used":[137],"as":[138],"a":[139,160],"traceability":[140],"if":[145],"parameters\u2019":[147],"lengths":[148],"integer":[151],"power":[152],"2,":[154],"e.g.,":[155],"128.":[156],"Moreover,":[157],"propose":[159],"new":[161],"UEAP,":[165],"Ultra-lightweight":[170],"Encryption":[171],"based":[172],"Protocol,":[174],"then":[176],"informally":[177],"formally,":[179],"Scyther":[181],"tool,":[182],"prove":[183],"UEAP":[186],"secure":[189],"all":[191],"known":[192],"active":[193],"passive":[195],"attacks.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
