메뉴 건너뛰기




Volumn 33, Issue 18, 2010, Pages 2155-2163

Privacy versus scalability in radio frequency identification systems

Author keywords

Active; Passive; Privacy; Radio frequency identification (RFID); Scalability

Indexed keywords

ACTIVE; FUNCTIONAL COMPONENTS; INTERACTIVE PROTOCOLS; LINE-OF-SIGHT PATHS; PASSIVE; PRIVACY; PRIVACY PRESERVING; RADIO FREQUENCY IDENTIFICATION SYSTEMS; RADIOFREQUENCY IDENTIFICATION TAGS; RFID READERS; RFID SYSTEMS; RFID TECHNOLOGY; TAG IDENTIFICATION; WIRELESS MEDIUM;

EID: 78049383154     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.08.006     Document Type: Review
Times cited : (34)

References (81)
  • 3
    • 84865498114 scopus 로고    scopus 로고
    • Securing low-cost RFID systems: An unconditionally secure approach
    • B. Alomair, L. Lazos, and R. Poovendran Securing low-cost RFID systems: an unconditionally secure approach Journal of Computer Security 2010 Special Issue on RFID System Security
    • (2010) Journal of Computer Security
    • Alomair, B.1    Lazos, L.2    Poovendran, R.3
  • 7
    • 26444478592 scopus 로고    scopus 로고
    • RFID traceability: A multilayer problem
    • Financial cryptography - FC'05
    • G. Avoine, and P. Oechslin RFID traceability: a multilayer problem Financial cryptography - FC'05 A. Patrick, M. Yung, Lecture Notes in Computer Science 2005 Springer Roseau, The Commonwealth Of Dominica, IFCA 125 140
    • (2005) Lecture Notes in Computer Science , pp. 125-140
    • Avoine, G.1    Oechslin, P.2
  • 12
    • 52449089460 scopus 로고    scopus 로고
    • Improved privacy of the tree-based hash protocols using physically unclonable function
    • Proceedings of the Sixth International Conference on Security and Cryptography for Networks - SCN'08
    • J. Bringer, H. Chabanne, and T. Icart Improved privacy of the tree-based hash protocols using physically unclonable function Proceedings of the Sixth International Conference on Security and Cryptography for Networks - SCN'08 R. Ostrovsky, R.D. Prisco, I. Visconti, Lecture Notes in Computer Science vol. 5229 2008 Springer Amalfi, Italy 77 91
    • (2008) Lecture Notes in Computer Science , vol.5229 , pp. 77-91
    • Bringer, J.1    Chabanne, H.2    Icart, T.3
  • 17
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • H.-Y. Chien SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity IEEE Transactions on Dependable and Secure Computing 4 4 2007 337 340
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 18
    • 38149091047 scopus 로고    scopus 로고
    • A lightweight RFID protocol using substring
    • Springer Taipei, Taiwan Embedded and Ubiquitous Computing - EUC'07
    • H.-Y. Chien, and C.-W. Huang A lightweight RFID protocol using substring Embedded and Ubiquitous Computing - EUC'07 Lecture Notes in Computer Science 4808 2007 Springer Taipei, Taiwan 422 431
    • (2007) Lecture Notes in Computer Science , vol.4808 , pp. 422-431
    • Chien, H.-Y.1    Huang, C.-W.2
  • 19
    • 33745915537 scopus 로고    scopus 로고
    • Backward channel protection method for RFID security schemes based on tree-walking algorithms
    • International conference on computational science and its applications - ICCSA 2006 proceedings, part IV
    • W. Choi, and B.-h. Roh Backward channel protection method for RFID security schemes based on tree-walking algorithms International conference on computational science and its applications - ICCSA 2006 proceedings, part IV M.L. Gavrilova, O. Gervasi, V. Kumar, C.J.K. Tan, D. Taniar, A. Lagana, Y. Mun, H. Choo, Lecture Notes in Computer Science 3983 2006 Springer-Verlag Glasgow, Scotland 279 287
    • (2006) Lecture Notes in Computer Science , vol.3983 , pp. 279-287
    • Choi, W.1    Roh, B.-H.2
  • 23
    • 35048859848 scopus 로고    scopus 로고
    • Strong Authentication for RFID Systems using the AES Algorithm
    • Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer Strong Authentication for RFID Systems using the AES Algorithm Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004 M. Joye, J.-J. Quisquater, Lecture Notes in Computer Science 3156 2004 Springer-Verlag Boston, Massachusetts, USA 357 370
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 24
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • Workshop on cryptographic hardware and embedded systems - CHES 2004
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer Strong authentication for RFID systems using the AES algorithm Workshop on cryptographic hardware and embedded systems - CHES 2004 M. Joye, J.-J. Quisquater, Lecture Notes in Computer Science vol. 3156 2004 Springer-Verlag Boston, Massachusetts, USA, 357 370
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 27
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • S. Garfinkel, A. Juels, and R. Pappu RFID privacy: an overview of problems and proposed solutions IEEE Security & Privacy 2005 34 43
    • (2005) IEEE Security & Privacy , pp. 34-43
    • Garfinkel, S.1    Juels, A.2    Pappu, R.3
  • 30
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • R. Sandhu, R. Thomas, 2004, IEEE Computer Society, Orlando, Florida, USA
    • D. Henrici, P. Müller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: International Workshop on Pervasive Computing and Communication Security - PerSec 2004, R. Sandhu, R. Thomas, 2004, IEEE Computer Society, Orlando, Florida, USA, pp. 149-153.
    • International Workshop on Pervasive Computing and Communication Security - PerSec 2004 , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 31
    • 50249134033 scopus 로고    scopus 로고
    • Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
    • Spain, July
    • D. Holcom, W. Burleson, K. Fu, Initial SRAM state as a fingerprint and source of true random numbers for RFID tags, in: Workshop on RFID Security - RFIDSec'07, Malaga, Spain, July 2007.
    • (2007) Workshop on RFID Security - RFIDSec'07, Malaga
    • Holcom, D.1    Burleson, W.2    Fu, K.3
  • 35
    • 20444478767 scopus 로고    scopus 로고
    • Soft blocking: Flexible blocker tags on the cheap
    • S. De Capitani di Vimercati, P. Syverson ACM Press, Washington, DC, USA
    • A. Juels, J. Brainard, Soft blocking: flexible blocker tags on the cheap, in: S. De Capitani di Vimercati, P. Syverson, Workshop on Privacy in the Electronic Society - WPES, 2004, ACM Press, Washington, DC, USA, pp.1-7.
    • (2004) Workshop on Privacy in the Electronic Society - WPES , pp. 1-7
    • Juels, A.1    Brainard, J.2
  • 41
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications(or: How secure is SSL?)
    • H. Krawczyk The order of encryption and authentication for protecting communications(or: How secure is SSL?) Advances in Cryptology-CRYPTO 2001 2001 310 331
    • (2001) Advances in Cryptology-CRYPTO 2001 , pp. 310-331
    • Krawczyk, H.1
  • 42
    • 34748848124 scopus 로고    scopus 로고
    • Universally composable and forward-secure RFID authentication and authenticated key exchange
    • F. Bao, S. Miller ACM Press Singapore Republic of Singapore
    • T.V. Le, M. Burmester, B. de Medeiros, Universally composable and forward-secure RFID authentication and authenticated key exchange, in: F. Bao, S. Miller, ACM Symposium on Information, Computer and Communications Security - ASIACCS 2007, ACM Press Singapore Republic of Singapore, 2007, pp. 242-252.
    • (2007) ACM Symposium on Information, Computer and Communications Security - ASIACCS 2007 , pp. 242-252
    • Le, T.V.1    Burmester, M.2    De Medeiros, B.3
  • 43
    • 58049141225 scopus 로고    scopus 로고
    • From Identification to Authentication - A Review of RFID Product Authentication Techniques
    • Ecrypt, Graz, Austria, July
    • M. Lehtonen, T. Staake, F. Michahelles, E. Fleisch. From Identification to Authentication - A Review of RFID Product Authentication Techniques, in: Workshop on RFID Security - RFIDSec'06, Ecrypt, Graz, Austria, July 2006.
    • (2006) Workshop on RFID Security - RFIDSec'06
    • Lehtonen, M.1    Staake, T.2    Michahelles, F.3    Fleisch, E.4
  • 46
    • 33749075547 scopus 로고    scopus 로고
    • True Random Number Generator in RFID Systems Against Traceability
    • IEEE Las Vegas, Nevada, USA
    • Z. Liu, and D. Peng True Random Number Generator in RFID Systems Against Traceability IEEE Consumer Communications and Networking Conference - CCNS 1 2006 IEEE Las Vegas, Nevada, USA 620 624
    • (2006) IEEE Consumer Communications and Networking Conference - CCNS , vol.1 , pp. 620-624
    • Liu, Z.1    Peng, D.2
  • 49
    • 77956135384 scopus 로고    scopus 로고
    • Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
    • Springer Tenerife, Canary Islands, Spain 1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices - WLC'10
    • J. Melia-Segui, J. Garcia-Alfaro, and J. Herrera-Joancomarti Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags 1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices - WLC'10 Lecture Notes in Computer Science 2010 Springer Tenerife, Canary Islands, Spain
    • (2010) Lecture Notes in Computer Science
    • Melia-Segui, J.1    Garcia-Alfaro, J.2    Herrera-Joancomarti, J.3
  • 51
    • 33745597876 scopus 로고    scopus 로고
    • A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
    • Selected Areas in Cryptography - SAC 2005
    • D. Molnar, A. Soppera, and D. Wagner A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags Selected Areas in Cryptography - SAC 2005 B. Preneel, S. Tavares, Lecture Notes in Computer Science 3897 2005 Springer-Verlag Kingston, Canada 276 290
    • (2005) Lecture Notes in Computer Science , vol.3897 , pp. 276-290
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 53
    • 33644902568 scopus 로고    scopus 로고
    • An adaptive memoryless tag anti-collision protocol for RFID networks
    • J. Myung, and W. Lee An adaptive memoryless tag anti-collision protocol for RFID networks IEEE Infocom 2005
    • (2005) IEEE Infocom
    • Myung, J.1    Lee, W.2
  • 54
    • 84940024494 scopus 로고    scopus 로고
    • Quantifying information leakage in tree-based hash protocols
    • Springer-Verlag Raleigh, North Carolina, USA Conference on information and communications security - ICICS'06
    • K. Nohl, and D. Evans Quantifying information leakage in tree-based hash protocols Conference on information and communications security - ICICS'06 Lecture Notes in Computer Science 4307 2006 Springer-Verlag Raleigh, North Carolina, USA 228 237
    • (2006) Lecture Notes in Computer Science , vol.4307 , pp. 228-237
    • Nohl, K.1    Evans, D.2
  • 55
    • 21644437713 scopus 로고    scopus 로고
    • Making a faster cryptanalytic time-memory trade-off
    • Springer
    • P. Oechslin Making a faster cryptanalytic time-memory trade-off Advances in Cryptology-CRYPTO 3 2003 Springer 617 630
    • (2003) Advances in Cryptology-CRYPTO , vol.3 , pp. 617-630
    • Oechslin, P.1
  • 56
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic Approach to "privacy-Friendly" Tags
    • MIT, MA, USA, November
    • M. Ohkubo, K. Suzuki, S. Kinoshita. Cryptographic Approach to "Privacy-Friendly" Tags. In RFID Privacy Workshop, MIT, MA, USA, November 2003.
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 57
    • 33749994390 scopus 로고    scopus 로고
    • Efficient Hash-Chain Based RFID Privacy Protection Scheme
    • Workshop Privacy: Current Status and Future Directions, Nottingham, England, September
    • M. Ohkubo, K. Suzuki, S. Kinoshita, Efficient Hash-Chain Based RFID Privacy Protection Scheme, in: International Conference on Ubiquitous Computing - Ubicomp, Workshop Privacy: Current Status and Future Directions, Nottingham, England, September 2004.
    • (2004) International Conference on Ubiquitous Computing - Ubicomp
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 61
    • 33750291916 scopus 로고    scopus 로고
    • RFID systems: A survey on security threats and proposed solutions
    • Springer-Verlag Albacete, Spain 11th IFIP international conference on personal wireless communications - PWC'06
    • P. Peris-Lopez, J.C. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda RFID systems: a survey on security threats and proposed solutions 11th IFIP international conference on personal wireless communications - PWC'06 Lecture Notes in Computer Science vol. 4217 2006 Springer-Verlag Albacete, Spain 159 170
    • (2006) Lecture Notes in Computer Science , vol.4217 , pp. 159-170
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.3    Ribagorda, A.4
  • 63
    • 77949860851 scopus 로고    scopus 로고
    • Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol
    • Springer-Verlag Jeju Island, Korea Workshop on Information Security Applications
    • P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol Workshop on Information Security Applications Lecture Notes in Computer Science 2008 Springer-Verlag Jeju Island, Korea
    • (2008) Lecture Notes in Computer Science
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 65
    • 2942556410 scopus 로고    scopus 로고
    • Radio-frequency identification: Security risks and challenges
    • S. Sarma, S. Weis, and D. Engels Radio-frequency identification: security risks and challenges Cryptobytes, RSA Laboratories 6 1 2003 2 9
    • (2003) Cryptobytes, RSA Laboratories , vol.6 , Issue.1 , pp. 2-9
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 66
    • 68949180679 scopus 로고    scopus 로고
    • We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID tags
    • July
    • N. Saxena, J. Voris, We can remember it for you wholesale: implications of data remanence on the use of RAM for true random number generation on RFID tags, in: Proceedings of Workshop on Radio Frequency Identification Security (RFIDsec'09), July 2009.
    • (2009) Proceedings of Workshop on Radio Frequency Identification Security (RFIDsec'09)
    • Saxena, N.1    Voris, J.2
  • 67
    • 33749406338 scopus 로고    scopus 로고
    • Scalable and untraceable authentication protocol for RFID
    • Springer-Verlag Seoul, Korea International workshop on security in ubiquitous computing systems - SecUbiq 2006
    • Y. Seo, and K. Kim Scalable and untraceable authentication protocol for RFID International workshop on security in ubiquitous computing systems - SecUbiq 2006 Lecture Notes in Computer Science 2006 Springer-Verlag Seoul, Korea
    • (2006) Lecture Notes in Computer Science
    • Seo, Y.1    Kim, K.2
  • 68
    • 70449590530 scopus 로고    scopus 로고
    • Squash: A new one-way hash function with provable security properties for highly constrained devices such as RFID tags
    • A. Shamir, Squash: a new one-way hash function with provable security properties for highly constrained devices such as RFID tags, in: International Workshop on RFID Security (RFIDSec'07), 2007.
    • (2007) International Workshop on RFID Security (RFIDSec'07)
    • Shamir, A.1
  • 74
    • 38149050502 scopus 로고    scopus 로고
    • A family of dunces: Trivial RFID identification and authentication protocols
    • June 20-22, Revised Selected Papers Springer, Ottawa, Canada
    • G. Tsudik, A family of dunces: trivial RFID identification and authentication protocols, in: Privacy Enhancing Technologies Seventh International Symposium PET 2007, June 20-22, Revised Selected Papers, vol. 4776, Springer, Ottawa, Canada, p. 45.
    • Privacy Enhancing Technologies Seventh International Symposium PET 2007 , vol.4776 , pp. 45
    • Tsudik, G.1
  • 75
    • 78049405307 scopus 로고    scopus 로고
    • We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID Tags
    • Leuven, Belgium, July
    • J. Voris, N. Saxena, We can remember it for you wholesale: implications of data remanence on the use of RAM for true random number generation on RFID Tags, in: Workshop on RFID Security - RFIDSec'09, Leuven, Belgium, July 2009.
    • (2009) Workshop on RFID Security - RFIDSec'09
    • Voris, J.1    Saxena, N.2
  • 77
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • International conference on security in pervasive computing - SPC 2003
    • S. Weis, S. Sarma, R. Rivest, and D. Engels Security and privacy aspects of low-cost radio frequency identification systems International conference on security in pervasive computing - SPC 2003 D. Hutter, G. Müller, W. Stephan, M. Ullmann, Lecture Notes in Computer Science vol. 2802 2003 Springer-Verlag Boppard, Germany 454 469
    • (2003) Lecture Notes in Computer Science , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 78
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • International conference on security in pervasive computing - SPC 2003
    • S. Weis, S. Sarma, R. Rivest, and D. Engels Security and privacy aspects of low-cost radio frequency identification systems International conference on security in pervasive computing - SPC 2003 D. Hutter, G. Müller, W. Stephan, M. Ullmann, Lecture Notes in Computer Science 2802 2003 Springer-Verlag Boppard, Germany 454 469
    • (2003) Lecture Notes in Computer Science , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.