메뉴 건너뛰기




Volumn 40, Issue 4, 2010, Pages 406-418

Survivable RFID systems: Issues, challenges, and techniques

Author keywords

Attack; radio frequency identification (RFID); recovery; survivability

Indexed keywords

ATTACK; ESSENTIAL SERVICES; HIGH MOBILITY; INVENTORY TRACKING; ISSUES AND CHALLENGES; MALICIOUS ATTACK; MOBILE OBJECTS; NATIONAL DEFENSE; RESEARCH DIRECTIONS; RF-ID TAGS; RFID SYSTEMS; SYSTEM FAILURES; VARIOUS ATTACKS;

EID: 77953725595     PISSN: 10946977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCC.2010.2043949     Document Type: Article
Times cited : (85)

References (58)
  • 3
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • May/Jun.
    • S. Garfinkel, A. Juels, and R. Pappu, "RFID privacy: An overview of problems and proposed solutions," IEEE Security Privacy, vol.3, no.3, p. 34-43, May/Jun. 2005.
    • (2005) IEEE Security Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.1    Juels, A.2    Pappu, R.3
  • 6
    • 84942246436 scopus 로고    scopus 로고
    • Towards a rigorous definition of information system survivability
    • presented at, Washington, DC
    • J. Knight, E. Strunk, and K. Sullivan, "Towards a rigorous definition of information system survivability," presented at the DARPA Inf. Survivability Conf. Expo., Washington, DC, 2003.
    • (2003) The DARPA Inf. Survivability Conf. Expo.
    • Knight, J.1    Strunk, E.2    Sullivan, K.3
  • 9
    • 0032679419 scopus 로고    scopus 로고
    • Information survivability for evolvable and adaptable real-time command and control systems
    • Jan.
    • B. Thuraisingham and J. Maurer, "Information survivability for evolvable and adaptable real-time command and control systems," IEEE Trans. Knowl. Data Eng., vol.11, no.1, pp. 228-238, Jan. 1999.
    • (1999) IEEE Trans. Knowl. Data Eng. , vol.11 , Issue.1 , pp. 228-238
    • Thuraisingham, B.1    Maurer, J.2
  • 10
    • 33748108997 scopus 로고    scopus 로고
    • Dependability through assured reconfiguration in embedded systems software
    • Jul.
    • E. Strunk and J.Knight, "Dependability through assured reconfiguration in embedded systems software," IEEE Trans. Dependable Secure Comput., vol.3, no.3, pp. 172-187, Jul. 2006.
    • (2006) IEEE Trans. Dependable Secure Comput. , vol.3 , Issue.3 , pp. 172-187
    • Strunk, E.1    Knight, J.2
  • 11
    • 0034228685 scopus 로고    scopus 로고
    • Reliability and survivability of wireless and mobile networks
    • Jul.
    • A. Snow, U. Varshney, and A. Malloy, "Reliability and survivability of wireless and mobile networks," IEEE Comput., vol.33, no.7, pp. 49-55, Jul. 2000.
    • (2000) IEEE Comput. , vol.33 , Issue.7 , pp. 49-55
    • Snow, A.1    Varshney, U.2    Malloy, A.3
  • 12
    • 77951735223 scopus 로고    scopus 로고
    • Research on the survivability of embedded real-time system
    • Y. Jin, "Research on the survivability of embedded real-time system," Int. J. Intell. Syst. Technol., vol.3, no.4, pp. 208-214, 2008.
    • (2008) Int. J. Intell. Syst. Technol. , vol.3 , Issue.4 , pp. 208-214
    • Jin, Y.1
  • 13
    • 33847577357 scopus 로고    scopus 로고
    • Survivability-over-security: Providing whole system assurance
    • Las Alamitos, CA
    • W. Yurcik, D. Doss, and H. Kruse, "Survivability-over-security: Providing whole system assurance," in Proc. IEEE/SEI/CERT Inf. Survivability Workshop, Las Alamitos, CA, 2000, pp. 201-204.
    • (2000) Proc. IEEE/SEI/CERT Inf. Survivability Workshop , pp. 201-204
    • Yurcik, W.1    Doss, D.2    Kruse, H.3
  • 16
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial model for radio frequency identification
    • [Online]. Available
    • G. Avoine. (2005). Adversarial model for radio frequency identification, Tech. Rep. 2005/049. [Online]. Available: http://eprint.iacr.org/2005/ 049.pdf
    • (2005) Tech. Rep. 2005/049
    • Avoine, G.1
  • 17
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID issues, practices, and architectures
    • presented at, Washington, DC
    • D. Molnar and D. Wagner, "Privacy and security in library RFID issues, practices, and architectures," presented at the ACM Conf. Comput. Commun. Security, Washington, DC, 2004.
    • (2004) The ACM Conf. Comput. Commun. Security
    • Molnar, D.1    Wagner, D.2
  • 19
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • Cryptographic Hardware and Embedded Systems, New York: Springer-Verlag
    • M. Feldhofer, S. Dominikus, and J.Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science, vol. 3156). New York: Springer-Verlag, 2004, pp. 357-370.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 20
    • 34548830043 scopus 로고    scopus 로고
    • A case against currently used hash functions in RFID protocols
    • presented at, Montpellier, France
    • M. Feldhofer and C. Rechberger, "A case against currently used hash functions in RFID protocols," presented at the 1st Int. Workshop Inf. Security, Montpellier, France, 2006.
    • (2006) The 1st Int. Workshop Inf. Security
    • Feldhofer, M.1    Rechberger, C.2
  • 21
    • 67650132302 scopus 로고    scopus 로고
    • Low-cost SHA-1 hash function architecture for RFID tags
    • presented at, Budapest, Hungary
    • M. O'Neil, "Low-cost SHA-1 hash function architecture for RFID tags," presented at the Workshop RFID Security, Budapest, Hungary, 2008.
    • (2008) The Workshop RFID Security
    • O'Neil, M.1
  • 22
    • 77953709509 scopus 로고    scopus 로고
    • Hardware implementation of a TEAbased lightweight encryption for RFID security
    • New York: Springer-Verlag
    • P. Israsena and S. Wongnamkum, "Hardware implementation of a TEAbased lightweight encryption for RFID security," in RFID Security. New York: Springer-Verlag, 2009, pp. 417-433.
    • (2009) RFID Security , pp. 417-433
    • Israsena, P.1    Wongnamkum, S.2
  • 24
    • 33745654539 scopus 로고    scopus 로고
    • RFID-tags for anti-counterfeiting
    • presented at the Topics Cryptography-CT-RSA 2006, San Jose, CA, Feb. 13-17
    • P. Tuyls and L. Batina, "RFID-tags for anti-counterfeiting," presented at the Topics Cryptography-CT-RSA 2006, Lecture Notes Comput. Sci., San Jose, CA, Feb. 13-17, 2006.
    • (2006) Lecture Notes Comput. Sci.
    • Tuyls, P.1    Batina, L.2
  • 25
    • 84969228768 scopus 로고    scopus 로고
    • Application of passive asymmetric RFID tags in a high-assurance avionics multi-domain RFID processing system
    • presented at, Freiburg, Germany, Jun.
    • R. Falk, F. Kohlmayer, A. Kopf, M. Braun, H. Seuschek, and M. Li, "Application of passive asymmetric RFID tags in a high-assurance avionics multi-domain RFID processing system," presented at the 4th Eur. Workshop RFID Syst. Technol., Freiburg, Germany, Jun. 2008.
    • (2008) The 4th Eur. Workshop RFID Syst. Technol.
    • Falk, R.1    Kohlmayer, F.2    Kopf, A.3    Braun, M.4    Seuschek, H.5    Li, M.6
  • 26
    • 77953692717 scopus 로고    scopus 로고
    • A flyweight RFID authentication protocol
    • presented at, Leuven, Belgium, Jun. 30-Jul. 2
    • M. Burmester and J.Munilla, "A flyweight RFID authentication protocol," presented at theWorkshop RFID Security, Leuven, Belgium, Jun. 30-Jul. 2, 2009.
    • (2009) The Workshop RFID Security
    • Burmester, M.1    Munilla, J.2
  • 27
    • 77953694965 scopus 로고    scopus 로고
    • Scalable RFID authentication protocol
    • presented at, Gold Coast, Australia, Oct. 19-21
    • B. Song and C. Mitchell, "Scalable RFID authentication protocol," presented at the 3rd Int. Conf. Netw. Syst. Security, Gold Coast, Australia, Oct. 19-21, 2009.
    • (2009) The 3rd Int. Conf. Netw. Syst. Security
    • Song, B.1    Mitchell, C.2
  • 28
    • 76749095501 scopus 로고    scopus 로고
    • RFID distance bounding protocol with mixed challenges to prevent replay attacks
    • presented at, Kanazawa, Ishikawa, Japan, Dec. 12-14
    • C. Kim and G. Avoine, "RFID distance bounding protocol with mixed challenges to prevent replay attacks," presented at the 8th Int. Conf. Cryptography Netw. Security, Kanazawa, Ishikawa, Japan, Dec. 12-14, 2009.
    • (2009) The 8th Int. Conf. Cryptography Netw. Security
    • Kim, C.1    Avoine, G.2
  • 29
    • 79952915179 scopus 로고    scopus 로고
    • Using HB family of protocols for privacy-preserving authentication of RFID tags in a population
    • presented at, Leuven, Belgium
    • T. Halevi, N. Saxena, and S. Halevi, "Using HB family of protocols for privacy-preserving authentication of RFID tags in a population," presented at the Workshop RFID Security, Leuven, Belgium, 2009.
    • (2009) The Workshop RFID Security
    • Halevi, T.1    Saxena, N.2    Halevi, S.3
  • 30
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • Oct.-Dec.
    • H. Chien, "SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity," IEEE Trans. Dependable Secure Comput., vol.4, no.4, pp. 337-340, Oct.-Dec. 2007.
    • (2007) IEEE Trans. Dependable Secure Comput. , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.1
  • 31
    • 70450265312 scopus 로고    scopus 로고
    • Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI
    • Jun. 19
    • R. Phan, "Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI," IEEE Trans. Dependable Secure Comput., vol.6, no.4, pp. 316-320, Jun. 19, 2008.
    • (2008) IEEE Trans. Dependable Secure Comput. , vol.6 , Issue.4 , pp. 316-320
    • Phan, R.1
  • 32
    • 77951273314 scopus 로고    scopus 로고
    • On the security of Chien's ultralightweight RFID authentication protocol
    • Jul. 22
    • H. Sun, W. Ting, and K. Wang, "On the security of Chien's ultralightweight RFID authentication protocol," IEEE Trans. Dependable Secure Comput., vol.99, no.1, p. 1, Jul. 22, 2009.
    • (2009) IEEE Trans. Dependable Secure Comput. , vol.99 , Issue.1 , pp. 1
    • Sun, H.1    Ting, W.2    Wang, K.3
  • 33
    • 60449095092 scopus 로고    scopus 로고
    • Security analysis of the SASI protocol
    • Jan.- Mar.
    • T. Cao, E. Bertino, and H. Lei, "Security analysis of the SASI protocol," IEEE Trans. Dependable Secure Comput., vol.6, no.2, pp. 73-77, Jan.- Mar. 2009.
    • (2009) IEEE Trans. Dependable Secure Comput. , vol.6 , Issue.2 , pp. 73-77
    • Cao, T.1    Bertino, E.2    Lei, H.3
  • 35
    • 70349155465 scopus 로고    scopus 로고
    • Attacks and improvements to an RFID mutual authentication protocol and its extensions
    • presented at, Zurich, Switzerland, Mar. 16-18
    • S. Cai and Y. Li, "Attacks and improvements to an RFID mutual authentication protocol and its extensions," presented at the 2nd ACM Conf. Wireless Netw. Security, Zurich, Switzerland, Mar. 16-18, 2009.
    • (2009) The 2nd ACM Conf. Wireless Netw. Security
    • Cai, S.1    Li, Y.2
  • 37
    • 77953691878 scopus 로고    scopus 로고
    • PUF Based RFIDs. [Online]. Available
    • PUF Based RFIDs. (2010). [Online]. Available: www.verayo.com/ product/pufrfid.html
    • (2010)
  • 38
    • 45749153036 scopus 로고    scopus 로고
    • PUF-HB: A tamper-resilient HB based authentication protocol
    • New York
    • G. Hammouri and B. Sunar, "PUF-HB: A tamper-resilient HB based authentication protocol," in Proc. Appl. Cryptography Netw. Security, New York, 2008, pp. 346-365.
    • (2008) Proc. Appl. Cryptography Netw. Security , pp. 346-365
    • Hammouri, G.1    Sunar, B.2
  • 39
    • 77953716003 scopus 로고    scopus 로고
    • Authentication pervasive devices with human protocols
    • presented at, Santa Barbara, CA, Aug. 14-18
    • A. Jules and S. Weis, "Authentication pervasive devices with human protocols," presented at the 25th Int. Cryptol. Conf., Santa Barbara, CA, Aug. 14-18.
    • The 25th Int. Cryptol. Conf.
    • Jules, A.1    Weis, S.2
  • 40
    • 52449089460 scopus 로고    scopus 로고
    • Improved privacy of the tree-based hash protocols using physically unclonable function
    • Amalfi, Italy, Sep. 10-12
    • J. Bringer, H. Chabanne, and T. Icart, "Improved privacy of the tree-based hash protocols using physically unclonable function," in Proc. 6th Conf. Security Cryptography Netw., Amalfi, Italy, Sep. 10-12, 2008, pp. 77-91.
    • (2008) Proc. 6th Conf. Security Cryptography Netw. , pp. 77-91
    • Bringer, J.1    Chabanne, H.2    Icart, T.3
  • 41
    • 34548285839 scopus 로고    scopus 로고
    • Remote password extraction from RFID tags
    • Sep.
    • Y. Oren and A. Shamir, "Remote password extraction from RFID tags," IEEE Trans. Comput., vol.56, no.9, pp. 1292-1296, Sep. 2007.
    • (2007) IEEE Trans. Comput. , vol.56 , Issue.9 , pp. 1292-1296
    • Oren, Y.1    Shamir, A.2
  • 42
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Cambridge, U.K.
    • F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Proc. 7th Int. Workshop Security Protocols, Cambridge, U.K., 1999, pp. 172-194.
    • (1999) Proc. 7th Int. Workshop Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 43
    • 29344433081 scopus 로고    scopus 로고
    • Scanning with a purpose-Supporting the fair information principles in RFID protocols
    • presented at, Tokyo, Japan, Nov. 8-9
    • C. Floerkemeier, R. Schneider, and M. Langheinrich, "Scanning with a purpose-Supporting the fair information principles in RFID protocols," presented at the 2nd Int. Symp. Ubiquitous Comput. Syst., Tokyo, Japan, Nov. 8-9, 2004.
    • (2004) The 2nd Int. Symp. Ubiquitous Comput. Syst.
    • Floerkemeier, C.1    Schneider, R.2    Langheinrich, M.3
  • 44
    • 18744409344 scopus 로고    scopus 로고
    • The blocker tag: Selective blocking of RFID tags for consumer privacy
    • Washington, DC
    • A. Juels, R. Rivest, andM. Szydlo, "The blocker tag: selective blocking of RFID tags for consumer privacy," in Proc. ACM Conf. Comput. Commun. Security, Washington, DC, 2003, pp. 103-111.
    • (2003) Proc. ACM Conf. Comput. Commun. Security , pp. 103-111
    • Juels, A.1    Rivest, R.2    Szydlo, M.3
  • 45
    • 14844290165 scopus 로고    scopus 로고
    • Enhancing RFID privacy via antenna energy analysis
    • presented at, Boston, MA
    • K. Fishkin and S. Roy, "Enhancing RFID privacy via antenna energy analysis," presented at the MIT RFID Privacy Workshop, Boston, MA, 2003.
    • (2003) The MIT RFID Privacy Workshop
    • Fishkin, K.1    Roy, S.2
  • 47
    • 26444435642 scopus 로고    scopus 로고
    • RFID guardian: A batterypowered mobile device for RFID privacy management
    • Brisbane, Australia Jul.
    • M. Rieback, B. Crispo, and A. Tanenbaum, "RFID guardian: A batterypowered mobile device for RFID privacy management," in Proc. Australian Conf. Inf. Security Privacy, Brisbane, Australia, Jul. 2005, pp. 184- 194.
    • (2005) Proc. Australian Conf. Inf. Security Privacy , pp. 184-194
    • Rieback, M.1    Crispo, B.2    Tanenbaum, A.3
  • 48
    • 33745597876 scopus 로고    scopus 로고
    • A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
    • D. Molnar, A. Soppera, and D. Wagner, "A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags," Lecture Notes Comput. Sci., vol.3897, pp. 276-290, 2006.
    • (2006) Lecture Notes Comput. Sci. , vol.3897 , pp. 276-290
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 49
    • 77953728527 scopus 로고    scopus 로고
    • Secure and private search protocols for RFID systems
    • [Online]. Available:
    • Y. Zuo, Secure and private search protocols for RFID systems. Inf. Syst. Front.: J. Res. Innov. [Online]. Available: http://www.springerlink.com/ content/b66r8r0465r89614/
    • Inf. Syst. Front.: J. Res. Innov.
    • Zuo, Y.1
  • 50
    • 77953701050 scopus 로고    scopus 로고
    • Data synchronization in privacy-preserving RFID authentication schemes
    • presented at, Budapest, Hungary Jul. 9-11
    • S. Canard and I. Coisel, "Data synchronization in privacy-preserving RFID authentication schemes," presented at theWorkshop RFID Security, Budapest, Hungary, Jul. 9-11, 2008.
    • (2008) The Workshop RFID Security
    • Canard, S.1    Coisel, I.2
  • 51
    • 33847330246 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • presented at, Athens, Greece, Sep. 5-9
    • T. Dimitriou, "A lightweight RFID protocol to protect against traceability and cloning attacks," presented at the 1st Int. Conf. Security Privacy Emerg. Areas Commun. Netw., Athens, Greece, Sep. 5-9, 2005.
    • (2005) The 1st Int. Conf. Security Privacy Emerg. Areas Commun. Netw.
    • Dimitriou, T.1
  • 53
    • 36248977046 scopus 로고    scopus 로고
    • Security analysis of two ultra-lightweight RFID authentication protocols
    • Sandton, Gauteng, South Africa, May 14-16
    • T. Li and G. Wang, "Security analysis of two ultra-lightweight RFID authentication protocols," in Proc. IFIP Int. Inf. Secur. Conf., Sandton, Gauteng, South Africa, May 14-16, 2007.
    • (2007) Proc. IFIP Int. Inf. Secur. Conf.
    • Li, T.1    Wang, G.2
  • 54
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • Feb.
    • A. Juels, "RFID security and privacy: A research survey," IEEE J. Sel. Areas Commun., vol.24, no.2, pp. 381-395, Feb. 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2 , pp. 381-395
    • Juels, A.1
  • 55
    • 0036983409 scopus 로고    scopus 로고
    • A distributed monitoring mechanism for wireless sensor networks
    • presented at, Atlanta, GA, Sep.
    • C. Hsin and M. Liu, "A distributed monitoring mechanism for wireless sensor networks," presented at the ACM Workshop Wireless Security, Atlanta, GA, Sep. 2002.
    • (2002) The ACM Workshop Wireless Security
    • Hsin, C.1    Liu, M.2
  • 56
    • 3142684688 scopus 로고    scopus 로고
    • Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks
    • presented at, Monterey, CA, Oct. 13-16
    • S. Doumit andD.Agrawal, "Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks," presented at the Military Commun. Conf., Monterey, CA, Oct. 13-16, 2003.
    • (2003) The Military Commun. Conf.
    • Doumit, S.1    Agrawal, D.2
  • 57
    • 77952380163 scopus 로고    scopus 로고
    • RFID survivability quantification and attack modeling
    • presented at, Hoboken, NJ, Mar. 22-24
    • Y. Zuo, "RFID survivability quantification and attack modeling," presented at the 3rd ACMConf.Wireless Netw. Security, Hoboken, NJ, Mar. 22-24, 2010.
    • The 3rd ACMConf. Wireless Netw. Security , pp. 2010
    • Zuo, Y.1
  • 58
    • 38149056913 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • presented at, Raleigh, NC, Dec. 4-7
    • C. Lim and T. Kwon, "Strong and robust RFID authentication enabling perfect ownership transfer," presented at the 8th Conf. Inf. Commun. Security, Raleigh, NC, Dec. 4-7, 2006.
    • (2006) The 8th Conf. Inf. Commun. Security
    • Lim, C.1    Kwon, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.