메뉴 건너뛰기




Volumn 25, Issue 1, 2009, Pages 33-57

An ultra light authentication protocol resistant to passive attacks under the Gen-2 specification

Author keywords

EPC Class 1 Gen 2 specification; Mutual authentication; Privacy; Pseudonym; Reader; RFID; Security; Tag

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CRYPTOGRAPHY; HASH FUNCTIONS; RADIO FREQUENCY IDENTIFICATION (RFID); RADIO NAVIGATION;

EID: 58449131289     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (18)

References (58)
  • 2
    • 58449116704 scopus 로고    scopus 로고
    • David Sexton's Battery, http://www.geocities.com/da5id65536, 2005.
    • David Sexton's Battery, http://www.geocities.com/da5id65536, 2005.
  • 3
    • 33744939250 scopus 로고    scopus 로고
    • Adversary model for radio frequency identification,
    • Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPC, Security and Cryptography Laboratory LASEC
    • G. Avoine, "Adversary model for radio frequency identification, " Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPC), Security and Cryptography Laboratory (LASEC), 2005.
    • (2005)
    • Avoine, G.1
  • 6
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class-1 Generation-2 standards
    • H. Y Chien and C. H. Chen, "Mutual authentication protocol for RFID conforming to EPC Class-1 Generation-2 standards," Computer Standards and Interfaces, Vol. 29, 2007, pp. 254-259.
    • (2007) Computer Standards and Interfaces , vol.29 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 7
    • 33744940544 scopus 로고    scopus 로고
    • Efficient RFID authentication protocol for ubiquitous computing environment
    • Proceedings of the 1st International Workshop on Security in Ubiquitous Computing Systems SecUbiq
    • E. Y. Choi, S. M. Lee, and D. H. Lee, "Efficient RFID authentication protocol for ubiquitous computing environment," in Proceedings of the 1st International Workshop on Security in Ubiquitous Computing Systems (SecUbiq), LNCS 3823, 2005, pp. 945-954.
    • (2005) LNCS , vol.3823 , pp. 945-954
    • Choi, E.Y.1    Lee, S.M.2    Lee, D.H.3
  • 9
    • 58449117783 scopus 로고    scopus 로고
    • RFID explained
    • White paper, 2004
    • R. Das, "RFID explained," IDTechEx, White paper, 2004.
    • IDTechEx
    • Das, R.1
  • 11
    • 58449120102 scopus 로고    scopus 로고
    • Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9: Gen-2
    • Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9: Gen-2, http://www.epcglobalinc.org/standards/.
  • 12
    • 58449109234 scopus 로고    scopus 로고
    • EPC Global
    • EPC Global, http://www.epcglobalinc.org/.
  • 13
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 3156, 2004, pp. 357-370.
    • (2004) LNCS , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 15
    • 85011285633 scopus 로고
    • The strict avalanche criterion: Spectral properties of Boolean functions and an extended definition
    • Proceedings of Advances in Cryptology, CRYPTO
    • R. Forré, "The strict avalanche criterion: Spectral properties of Boolean functions and an extended definition," in Proceedings of Advances in Cryptology - CRYPTO, LNCS 403, 1990, pp. 450-468.
    • (1990) LNCS , vol.403 , pp. 450-468
    • Forré, R.1
  • 19
    • 77952285870 scopus 로고    scopus 로고
    • Security of ultra-lightweight RFID authentication protocols and its improvements
    • H. Y. Chien and C. W. Huang, "Security of ultra-lightweight RFID authentication protocols and its improvements," ACMSIGOPS Operating Systems Review, Vol. 41, 2007, pp. 83-86.
    • (2007) ACMSIGOPS Operating Systems Review , vol.41 , pp. 83-86
    • Chien, H.Y.1    Huang, C.W.2
  • 20
    • 58449111047 scopus 로고    scopus 로고
    • ISO, International Organization for Standardization
    • ISO - International Organization for Standardization, http://www.iso.org/.
  • 21
    • 58449083103 scopus 로고    scopus 로고
    • Security and privacy on authentication protocol for low-cost radio frequency identification,
    • Master Thesis, School of Engineering, Information and Communications University
    • J. Yang, "Security and privacy on authentication protocol for low-cost radio frequency identification," Master Thesis, School of Engineering, Information and Communications University, 2004.
    • (2004)
    • Yang, J.1
  • 22
    • 58449125280 scopus 로고    scopus 로고
    • Frequently asked questions
    • "Frequently asked questions," RFID Journal, http://www.rfidjournal.com, 2006.
    • (2006) RFID Journal
  • 23
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • Proceedings of the 4th International Conference on Security in Communication Networks
    • A. Juels, "Minimalist cryptography for low-cost RFID tags," in Proceedings of the 4th International Conference on Security in Communication Networks, LNCS 3352, 2004, pp. 149-164.
    • (2004) LNCS , vol.3352 , pp. 149-164
    • Juels, A.1
  • 28
    • 58449130519 scopus 로고    scopus 로고
    • RFID tag-reader mutual authentication scheme utilizing tag's access password
    • D. M. Konidala and K. Kim, "RFID tag-reader mutual authentication scheme utilizing tag's access password," White Paper wp-hardware-033, Auto-ID Labs, 2007.
    • (2007) White Paper wp-hardware-033, Auto-ID Labs
    • Konidala, D.M.1    Kim, K.2
  • 29
    • 0012694899 scopus 로고
    • Evolving a computer program to generate random number using the genetic programming paradigm
    • J. R. Koza, "Evolving a computer program to generate random number using the genetic programming paradigm," in Proceedings of the 4th International Conference on Genetic Algorithms, 1991, pp. 37-44.
    • (1991) Proceedings of the 4th International Conference on Genetic Algorithms , pp. 37-44
    • Koza, J.R.1
  • 30
    • 84889975404 scopus 로고    scopus 로고
    • From identification to authentication - A review of RFID product authentication techniques
    • Springer Berlin Heidelberg
    • M. Lehtonen, T. Staake, F. Michahelles, and E. Fleisch, "From identification to authentication - A review of RFID product authentication techniques," Networked RFID Systems and Lightweight Cryptography, Springer Berlin Heidelberg, 2007, pp. 169-187.
    • (2007) Networked RFID Systems and Lightweight Cryptography , pp. 169-187
    • Lehtonen, M.1    Staake, T.2    Michahelles, F.3    Fleisch, E.4
  • 33
    • 39349089777 scopus 로고    scopus 로고
    • Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme
    • T. L. Lim and T. Li, "Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme," in Proceedings of Global Telecommunications Conference, 2007, pp. 59-63.
    • (2007) Proceedings of Global Telecommunications Conference , pp. 59-63
    • Lim, T.L.1    Li, T.2
  • 34
    • 33745791751 scopus 로고    scopus 로고
    • Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags
    • Proceedings of International Conference on Smart Card Research and Advanced Applications
    • T. Lohmmann, M. Schneider, and C. Ruland, "Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags," in Proceedings of International Conference on Smart Card Research and Advanced Applications, LNCS 3928, 2006, pp. 278-288.
    • (2006) LNCS , vol.3928 , pp. 278-288
    • Lohmmann, T.1    Schneider, M.2    Ruland, C.3
  • 40
    • 33750067948 scopus 로고    scopus 로고
    • M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
    • Proceedings of International Conference on Ubiquitous Intelligence and Computing
    • P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, "M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags," in Proceedings of International Conference on Ubiquitous Intelligence and Computing, LNCS 4159, 2006, pp. 912-923.
    • (2006) LNCS , vol.4159 , pp. 912-923
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.3    Ribagorda, A.4
  • 43
    • 33845455482 scopus 로고    scopus 로고
    • EMAP: An efficient mutual authentication protocol for low-cost RFID tags
    • Proceedings of OTM Federated Conferences and Workshop: IS Workshop
    • P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An efficient mutual authentication protocol for low-cost RFID tags," in Proceedings of OTM Federated Conferences and Workshop: IS Workshop, LNCS 4277, 2006, pp. 352-361.
    • (2006) LNCS , vol.4277 , pp. 352-361
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 45
    • 32444435813 scopus 로고    scopus 로고
    • Radio frequency identification (RFID)
    • C. M. Roberts, "Radio frequency identification (RFID)," Computers and Security, Vol. 25, 2006, pp. 18-26.
    • (2006) Computers and Security , vol.25 , pp. 18-26
    • Roberts, C.M.1
  • 46
    • 35248872610 scopus 로고    scopus 로고
    • RFID systems and security and privacy implications
    • Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems
    • S. E. Sarma, S. A. Weis, and D. W. Engels, "RFID systems and security and privacy implications," in Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 2523, 2002, pp. 454-470.
    • (2002) LNCS , vol.2523 , pp. 454-470
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 47
    • 33750079626 scopus 로고    scopus 로고
    • Automatic identification and data collection technologies in the transportation industry: BarCode and RFID,
    • Technical Report
    • W. Sean and L. Thomas, "Automatic identification and data collection technologies in the transportation industry: BarCode and RFID," Technical Report, 2001.
    • (2001)
    • Sean, W.1    Thomas, L.2
  • 49
    • 58449121448 scopus 로고    scopus 로고
    • San Francisco Business Times, Surging market for RFID security predicted, 2004, http://sanfrancisco.bizjournals.com/sanfrancisco/stories/ 2004/03/22/daily22.html.
    • San Francisco Business Times, "Surging market for RFID security predicted," 2004, http://sanfrancisco.bizjournals.com/sanfrancisco/stories/ 2004/03/22/daily22.html.
  • 52
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Proceedings of the 1st International Conference on Security in Pervasive Computing
    • S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proceedings of the 1st International Conference on Security in Pervasive Computing, LNCS 2802, 2003, pp. 454-469.
    • (2003) LNCS , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 53
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Proceedings of the 1st International Conference on Security in Pervasive Computing
    • S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proceedings of the 1st International Conference on Security in Pervasive Computing, LNCS 2802, 2004, pp. 201-212.
    • (2004) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 54
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • M. Weiser, "The computer for the 21st century," Scientific American, Vol. 265, 1991, pp. 94-104.
    • (1991) Scientific American , vol.265 , pp. 94-104
    • Weiser, M.1
  • 55
    • 84869815133 scopus 로고
    • TEA, a tiny encryption algorithm
    • Proceedings of the 2nd International Workshop on Fast Software Encryption
    • D. J. Wheeler and R. M. Needham, "TEA, a tiny encryption algorithm," in Proceedings of the 2nd International Workshop on Fast Software Encryption, LNCS 1008, 1994, pp. 363-366.
    • (1994) LNCS , vol.1008 , pp. 363-366
    • Wheeler, D.J.1    Needham, R.M.2
  • 56
    • 15744395962 scopus 로고    scopus 로고
    • TEA extensions,
    • Technical Report, Computer Laboratory, University of Cambridge
    • D. J. Wheeler and R. M. Needham, "TEA extensions," Technical Report, Computer Laboratory, University of Cambridge, 1997.
    • (1997)
    • Wheeler, D.J.1    Needham, R.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.