메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1065-1069

Attacks on an efficient RFID authentication protocol

Author keywords

Authentication protocol; Privacy; RFID security

Indexed keywords

AUTHENTICATION PROTOCOLS; DENIAL OF SERVICE ATTACKS; DESYNCHRONIZATION; IMPERSONATION ATTACK; LOW-COST DEVICES; PRIVACY; RF-ID TAGS; RFID AUTHENTICATION; RFID SECURITY; TAMPER-RESISTANT; TIME COMPLEXITY; UNTRACEABILITY;

EID: 78249243112     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIT.2010.194     Document Type: Conference Paper
Times cited : (6)

References (18)
  • 1
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • February
    • H. Chien and C. Chen, "Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards," Computer Standards & Interfaces, 29(2):254-259, February 2007.
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.1    Chen, C.2
  • 2
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to 'privacy-friendly tags'
    • MIT, MA, USA, November
    • M. Ohkubo, K. Suzki, and S. Kinoshita, "Cryptographic approach to 'privacy-friendly tags'," In RFID Privacy Workshop, MIT, MA, USA, November 2003. http://www.rfidprivacy.us/2003/agenda.php.
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzki, K.2    Kinoshita, S.3
  • 3
    • 24644501824 scopus 로고    scopus 로고
    • Challengeresponse based on RFID authentication protocol for distributed database environment
    • D. Hutter and M. Ullmann, editors, volume 3450 of Lecture Notes in Computer Science, Boppard, Germany, April, Springer-Verlag, Berlin
    • K. Rhee, J. Kwak, S. Kim, and D. Won, "Challengeresponse based on RFID authentication protocol for distributed database environment," In D. Hutter and M. Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 2005, volume 3450 of Lecture Notes in Computer Science, pages 70-84, Boppard, Germany, April 2005. Springer-Verlag, Berlin.
    • (2005) International Conference on Security in Pervasive Computing-SPC 2005 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 4
    • 67650109513 scopus 로고    scopus 로고
    • Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning
    • Hiroshima, Japan, January
    • D. Duc, J. Park, H. Lee, and K. Kim, "Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning," In Symposium on Cryptography and Information Security 2006, Hiroshima, Japan, January 2006.
    • (2006) Symposium on Cryptography and Information Security 2006
    • Duc, D.1    Park, J.2    Lee, H.3    Kim, K.4
  • 5
    • 56749103027 scopus 로고    scopus 로고
    • RFID authentication protocol for low-cost tags
    • V. D. Gligor, J. Hubaux, and R. Poovendran, editors, Alexandria, Virginia, USA, April, ACM Press
    • B. Song and C. J. Mitchell, "RFID authentication protocol for low-cost tags," In V. D. Gligor, J. Hubaux, and R. Poovendran, editors, ACM Conference on Wireless Network Security - WiSec'08, pages 140-147, Alexandria, Virginia, USA, April 2008. ACM Press.
    • (2008) ACM Conference on Wireless Network Security-WiSec'08 , pp. 140-147
    • Song, B.1    Mitchell, C.J.2
  • 7
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • R. Sandhu and R. Thomas, editors, Orlando, Florida, USA, March, IEEE Computer Society
    • A. Henrici and P. Muller, "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers," In R. Sandhu and R. Thomas, editors, International Workshop on Pervasive Computing and Communication Security - PerSec 2004, pages 149-153, Orlando, Florida, USA, March 2004. IEEE Computer Society.
    • (2004) International Workshop on Pervasive Computing and Communication Security-PerSec 2004 , pp. 149-153
    • Henrici, A.1    Muller, P.2
  • 8
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • B. Pfitzmann and P. Liu, editors, Washington, DC, USA, October, ACM Press
    • D. Molnar and D. Wagner, "Privacy and security in library RFID: issues, practices, and architectures," In B. Pfitzmann and P. Liu, editors, Conference on Computer and Communications Security - ACM CCS, pages 210-219, Washington, DC, USA, October 2004. ACM Press.
    • (2004) Conference on Computer and Communications Security-ACM CCS , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 9
    • 38149047468 scopus 로고    scopus 로고
    • Lowcost and strong-security RFID authentication protocol
    • volume 4809 of Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • J. Ha, S.J. Moon, J.M. Gonzlez Nieto, and C. Boyd, "Lowcost and strong-security RFID authentication protocol," In EUC Workshops 2007, volume 4809 of Lecture Notes in Computer Science, pages 795-807, 2007. Springer-Verlag, Berlin.
    • (2007) EUC Workshops 2007 , pp. 795-807
    • Ha, J.1    Moon, S.J.2    Nieto, J.M.G.3    Boyd, C.4
  • 11
    • 70449579747 scopus 로고    scopus 로고
    • Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
    • M. Burmester, B. de Medeiros, and R. Motta, "Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries," Journal of Applied Cryptography, 1(2):79-90, 2008.
    • (2008) Journal of Applied Cryptography , vol.1 , Issue.2 , pp. 79-90
    • Burmester, M.1    Medeiros, B.D.2    Motta, R.3
  • 12
    • 70349155465 scopus 로고    scopus 로고
    • Attacks and improvements to an RFID mutual authentication protocol and its extensions
    • Zurich, Switzerland, March, ACM Press
    • S. Cai, Y. Li, T. Li, and R. Deng, "Attacks and improvements to an RFID mutual authentication protocol and its extensions," In The Second ACM Conference on Wireless Network Security - WiSec09, pages 51-58, Zurich, Switzerland, March 2009. ACM Press.
    • (2009) The Second ACM Conference on Wireless Network Security-WiSec09 , pp. 51-58
    • Cai, S.1    Li, Y.2    Li, T.3    Deng, R.4
  • 14
    • 38049125926 scopus 로고    scopus 로고
    • LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID system
    • F. Stajano, H. Kim, J. Chae and S. Kim editors, volume 4412 of Lecture Notes in Computer Science, Jeju Island, Korea, December, Springer-Verlag, Berlin
    • J. Ha, J. Ha, S. Moon, and C. Boyd, "LRMAP: lightweight and resynchronous mutual authentication protocol for RFID system," In F. Stajano, H. Kim, J. Chae and S. Kim editors, Ubiquitous Convergence Technology, First International Conference - ICUCT 2006, volume 4412 of Lecture Notes in Computer Science, pages 80-89, Jeju Island, Korea, December 2006. Springer-Verlag, Berlin.
    • (2006) Ubiquitous Convergence Technology, First International Conference-ICUCT 2006 , pp. 80-89
    • Ha, J.1    Ha, J.2    Moon, S.3    Boyd, C.4
  • 17


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.