메뉴 건너뛰기




Volumn 46, Issue 4, 2009, Pages 583-592

Research on hash-based RFID security authentication protocol

Author keywords

Authentication protocol; Back end server; Hash; HSAP; Reader; RFID; Security; Tag

Indexed keywords

AUTHENTICATION PROTOCOL; BACK-END SERVER; HASH; HSAP; READER; RFID; SECURITY; TAG;

EID: 65349109748     PISSN: 10001239     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (51)

References (36)
  • 1
    • 25144488541 scopus 로고    scopus 로고
    • Shrouds of time - The history of RFID, Ver. 1.0
    • Pittsburgh: AIM Inc.
    • Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh: AIM Inc., 2001
    • (2001)
    • Landt, J.1    Catlin, B.2
  • 2
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Berlin: Springer
    • Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C]//Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005: 70-84
    • (2005) Proc of the 2nd Int Conf on Security in Pervasive Computing , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3
  • 5
    • 33744964854 scopus 로고    scopus 로고
    • Design and analysis of cryptographic protocols for RFID
    • in Chinese
    • Zhou Yongbin, Feng Dengguo. Design and analysis of cryptographic protocols for RFID [J]. Chinese Journal of Computers, 2006, 29(4): 581-589 (in Chinese)
    • (2006) Chinese Journal of Computers , vol.29 , Issue.4 , pp. 581-589
    • Zhou, Y.1    Feng, D.2
  • 8
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Berlin: Springer
    • Stajano F, Anderson R. The resurrecting duckling: Security issues for ad-hoc wireless networks [C]//Proc of the 7th Int Workshop on Security Protocols. Berlin: Springer, 1999: 172-194
    • (1999) Proc of the 7th Int Workshop on Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 11
    • 65349093752 scopus 로고    scopus 로고
    • Cryptographic approach to "Privacy-Friendly" tags
    • Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to "Privacy-Friendly" tags [OL]. [2007-10-07]. http://www.rfidprivacy.us/2003/papers/ohkubo.pdf
    • (2007)
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 12
    • 52049088655 scopus 로고    scopus 로고
    • Mutual authentication of RFID system using synchronized secret information
    • Daejeon, Korea: School of Engineering, Information and Communications University
    • Lee S. Mutual authentication of RFID system using synchronized secret information [D]. Daejeon, Korea: School of Engineering, Information and Communications University, 2005
    • (2005)
    • Lee, S.1
  • 16
    • 65349174893 scopus 로고    scopus 로고
    • Cellphone could crack RFID tags, says cryptographer
    • Merritt R. Cellphone could crack RFID tags, says cryptographer [OL]. (2006-02-14) http://www.eetimes.com/news/latest/showArticle.jhtml? articleID=180201688
    • (2006)
    • Merritt, R.1
  • 18
    • 38049125926 scopus 로고    scopus 로고
    • LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID system
    • Berlin: Springer
    • Ha J C, Ha J H, Moon S J, et al. LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID system [C]//Proc of the Int Conf on Ubiquitous Convergence Technology. Berlin: Springer, 2007: 80-89
    • (2007) Proc of the Int Conf on Ubiquitous Convergence Technology , pp. 80-89
    • Ha, J.C.1    Ha, J.H.2    Moon, S.J.3
  • 21
    • 33745776359 scopus 로고    scopus 로고
    • Universal hashing for ultra-low-power cryptographic hardware applications
    • Worcester, MA: Department of Electronical Engineering, Worcester Polytechnic Institute
    • YÄuksel K. Universal hashing for ultra-low-power cryptographic hardware applications [D]. Worcester, MA: Department of Electronical Engineering, Worcester Polytechnic Institute, 2004
    • (2004)
    • YÄuksel, K.1
  • 23
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Berlin: Springer
    • Weis S A, Sarma S E, Rivest R L, et al. Security and privacy aspects of low-cost radio frequency identification systems [C]//Proc of the 1st Security in Pervasive Computing. Berlin: Springer, 2003: 201-212
    • (2003) Proc of the 1st Security in Pervasive Computing , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3
  • 24
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • Los Alamitos, CA: IEEE Computer Society
    • Henrici D, P Mauller. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers [C]//Proc of the 2nd IEEE Annual Conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2004
    • (2004) Proc of the 2nd IEEE Annual Conf on Pervasive Computing and Communications Workshops
    • Henrici, D.1    Mauller, P.2
  • 27
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • Los Alamitos, CA: IEEE Computer Society
    • Molnar D, Wagner D. Privacy and security in library RFID: Issues, practices, and architectures [C]//Proc of the 11th ACM Conf on Computer and Communications Security. Los Alamitos, CA: IEEE Computer Society, 2004: 210-219
    • (2004) Proc of the 11th ACM Conf on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 28
    • 35248832722 scopus 로고    scopus 로고
    • Squealing euros: Privacy-protection in RFID-enabled banknotes
    • Berlin: Springer
    • Juels A, Pappu R. Squealing euros: Privacy-protection in RFID-enabled banknotes [C]//Proc of the Financial Cryptography. Berlin: Springer, 2003: 103-121
    • (2003) Proc of the Financial Cryptography , pp. 103-121
    • Juels, A.1    Pappu, R.2
  • 30
    • 33644534001 scopus 로고    scopus 로고
    • Lightweight authentication protocols for low-cost RFID tags
    • Budapest, Hungary; Budapest University of Technology and Economics
    • Vajda I, Buttydn L. Lightweight authentication protocols for low-cost RFID tags [C]//Proc of the 2nd Workshop on Security in Ubiquitous Computing. Budapest, Hungary; Budapest University of Technology and Economics, 2003
    • (2003) Proc of the 2nd Workshop on Security in Ubiquitous Computing
    • Vajda, I.1    Buttydn, L.2
  • 31
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial model for radio frequency identification, 2005/049
    • Avoine G. Adversarial model for radio frequency identification, 2005/049 [R/OL]. [2005-02-21]. http://eprint.iacr.org/, 2005
    • (2005)
    • Avoine, G.1
  • 32
    • 33749066158 scopus 로고    scopus 로고
    • ™ radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz, Version 1.0.9
    • EPCglobal. Cambridge, MA: EPCglobal Inc.
    • ™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz, Version 1.0.9[S]. Cambridge, MA: EPCglobal Inc., 2004
    • (2004)
  • 33
    • 65349113973 scopus 로고    scopus 로고
    • ISO 18000-6, RFID for item management-air interface. Part 6: Parameters for air interface communications at 860 MHz to 960 MHz
    • International Organization for Standardization (ISO)
    • International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860 MHz to 960 MHz [S]. 2004
    • (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.