메뉴 건너뛰기




Volumn , Issue , 2009, Pages 51-58

Attacks and improvements to an RFID mutual authentication protocol and its extensions

Author keywords

Authentication; Privacy; RFID; Security

Indexed keywords

COMPUTATIONAL REQUIREMENTS; DESYNCHRONIZATION; IMPERSONATION ATTACK; MUTUAL AUTHENTICATION; PRIVACY; RF-ID TAGS; RFID; SECURITY; SECURITY PROPERTIES; TRANSFER PROTOCOL;

EID: 70349155465     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1514274.1514282     Document Type: Conference Paper
Times cited : (71)

References (22)
  • 4
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to epc class 1 generation 2 standards
    • H.-Y. Chien and C.-H. Chen. Mutual authentication protocol for RFID conforming to epc class 1 generation 2 standards. Computer Standards Interfaces, 29(2):254-259, 2007.
    • (2007) Computer Standards Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 5
    • 33847330246 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • T. Dimitriou. A lightweight RFID protocol to protect against traceability and cloning attacks. In SecureComm, pages 59-66, 2005.
    • (2005) SecureComm , pp. 59-66
    • Dimitriou, T.1
  • 7
    • 33751513718 scopus 로고    scopus 로고
    • Enhancing security of epcglobal gen-2 RFID tag against traceability and cloning
    • D. N. Duc, J. Park, H. Lee, and K. Kim. Enhancing security of epcglobal gen-2 RFID tag against traceability and cloning. In SCIS, 2006.
    • (2006) SCIS
    • Duc, D.N.1    Park, J.2    Lee, H.3    Kim, K.4
  • 9
    • 59249097693 scopus 로고    scopus 로고
    • A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
    • S. Fouladgar and H. Afifi. A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags. JCM, 2(6):6-13, 2007.
    • (2007) JCM , vol.2 , Issue.6 , pp. 6-13
    • Fouladgar, S.1    Afifi, H.2
  • 10
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • D. Henrici and P. Müller. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In PerSec, pages 149-153, 2004.
    • (2004) PerSec , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 11
    • 34748832806 scopus 로고    scopus 로고
    • Defining Strong Privacy for RFID. Cryptology ePrint Archive
    • Report 2006/137
    • A. Juels and S. Weis. Defining Strong Privacy for RFID. Cryptology ePrint Archive, Report 2006/137, 2006.
    • (2006)
    • Juels, A.1    Weis, S.2
  • 12
    • 34748921704 scopus 로고    scopus 로고
    • Protecting RFID Communications in Supply Chains
    • Singapore, ACM
    • Y. Li and X. Ding. Protecting RFID Communications in Supply Chains. In ASIACCS '07, pages 234-241, Singapore, 2007. ACM.
    • (2007) ASIACCS '07 , pp. 234-241
    • Li, Y.1    Ding, X.2
  • 13
    • 84977783611 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • C. H. Lim and T. Kwon. Strong and robust RFID authentication enabling perfect ownership transfer. In ICICS, pages 1-20, 2006.
    • (2006) ICICS , pp. 1-20
    • Lim, C.H.1    Kwon, T.2
  • 14
    • 33745597876 scopus 로고    scopus 로고
    • A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
    • D. Molnar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In Selected Areas in Cryptography, pages 276-290, 2005.
    • (2005) Selected Areas in Cryptography , pp. 276-290
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 15
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • D. Molnar and D. Wagner. Privacy and security in library RFID: issues, practices, and architectures. In ACM CCS, pages 210-219, 2004.
    • (2004) ACM CCS , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 17
    • 38349066494 scopus 로고    scopus 로고
    • An efficient and secure RFID security method with ownership transfer
    • K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi. An efficient and secure RFID security method with ownership transfer. In CIS, pages 778-787, 2006.
    • (2006) CIS , pp. 778-787
    • Osaka, K.1    Takagi, T.2    Yamazaki, K.3    Takahashi, O.4
  • 18
    • 33744928896 scopus 로고    scopus 로고
    • Reassignment scheme of an RFID tag's key for owner transfer
    • J. Saito, K. Imamoto, and K. Sakurai. Reassignment scheme of an RFID tag's key for owner transfer. In EUC Workshops, pages 1303-1312, 2005.
    • (2005) EUC Workshops , pp. 1303-1312
    • Saito, J.1    Imamoto, K.2    Sakurai, K.3
  • 20
    • 56749103027 scopus 로고    scopus 로고
    • RFID authentication protocol for low-cost tags
    • B. Song and C. J. Mitchell. RFID authentication protocol for low-cost tags. In WISEC, pages 140-147, 2008.
    • (2008) WISEC , pp. 140-147
    • Song, B.1    Mitchell, C.J.2
  • 21
    • 65649089378 scopus 로고    scopus 로고
    • Attacks on RFID protocols. Cryptology ePrint Archive
    • Report 2008/310
    • T. van Deursen and S. Radomirovic. Attacks on RFID protocols. Cryptology ePrint Archive, Report 2008/310, 2008.
    • (2008)
    • van Deursen, T.1    Radomirovic, S.2
  • 22
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In SPC, pages 201-212, 2003.
    • (2003) SPC , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.