메뉴 건너뛰기




Volumn 6, Issue 1, 2011, Pages 157-169

Security improvement in authentication protocol for gen-2 based RFID system

Author keywords

Authentication protocol; BAN logic; Formal verification; RFID system

Indexed keywords

AUTHENTICATION; COMPUTATION THEORY; COMPUTER CIRCUITS; FORMAL VERIFICATION; HASH FUNCTIONS;

EID: 79952396973     PISSN: 19759320     EISSN: None     Source Type: Journal    
DOI: 10.4156/jcit.vol6.issue1.18     Document Type: Article
Times cited : (28)

References (21)
  • 1
    • 79952409186 scopus 로고    scopus 로고
    • EPCglobal
    • EPCglobal,http://www.EPCglobalinc.org/
  • 8
    • 79952371517 scopus 로고    scopus 로고
    • MD5, SHA-1, SHA-256 Hash core for Asic
    • Datasheet Helion Technology. MD5, SHA-1, SHA-256 Hash core for Asic. http://www.heliontech.com, 2005.
    • (2005) Datasheet Helion Technology
  • 9
    • 79952381189 scopus 로고    scopus 로고
    • In Proceedings of The Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS). San Diego, CA
    • K Yksel, J P Kaps, B Sunar. Universal Hash Functions for Emerging Ultra-low-power Networks[C]. In Proceedings of The Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS). San Diego, CA. 2004.
    • (2004) Universal Hash Functions For Emerging Ultra-low-power Networks[C]
    • Yksel, K.1    Kaps, J.P.2    Sunar, B.3
  • 10
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication Protocol for RFID Conforming to EPC Class 1 Generation-2 Standard
    • H Chien, C Chen. Mutual authentication Protocol for RFID Conforming to EPC Class 1 Generation-2 Standard, Computer Standards & Interfaces, 2007.29(2):254-259
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.1    Chen, C.2
  • 11
    • 79952382310 scopus 로고    scopus 로고
    • How to Ensure Forward and Backward Security of RFID Identification Schemes by Using a Robust PRBG
    • Report 2008/201
    • J Wu, D Stinson. How to Ensure Forward and Backward Security of RFID Identification Schemes by Using a Robust PRBG. Cryptology ePrint Archive, Report 2008/201, 2008. http://eprint.iacr.org/.
    • (2008) Cryptology EPrint Archive
    • Wu, J.1    Stinson, D.2
  • 12
    • 58449131289 scopus 로고    scopus 로고
    • An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification [J]
    • P Pedro, C Julio, M Juan, A Ribagorda. An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification [J]. J. Inf. Sci. Eng.2009. 25(1): 33-57
    • (2009) J. Inf. Sci. Eng , vol.25 , Issue.1 , pp. 33-57
    • Pedro, P.1    Julio, C.2    Juan, M.3    Ribagorda, A.4
  • 14
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of EPC Class 1 Generation 2 Standards RFID system with Mutual Authentication and Privacy Protection [J]
    • In Press, doi:10.1016/j.engappai
    • C Chen, Y Deng. Conformation of EPC Class 1 Generation 2 Standards RFID system with Mutual Authentication and Privacy Protection [J]. Engineering Applications of Artificial Intelligence,In Press, doi:10.1016/j.engappai.2008.10.022
    • (2008) Engineering Applications of Artificial Intelligence , vol.10 , pp. 022
    • Chen, C.1    Deng, Y.2
  • 16
    • 68949181328 scopus 로고    scopus 로고
    • Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID Systems [J]
    • E Choi, D Lee, J Lim. Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID Systems [J]. Computer Standards & Interfaces.2009.31(6):1124-1130
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.6 , pp. 1124-1130
    • Choi, E.1    Lim, J.2
  • 17
    • 67649484364 scopus 로고    scopus 로고
    • A Gen2-based RFID Authentication Protocol for Security and Privacy[C]
    • H Sun, W Ting. A Gen2-based RFID Authentication Protocol for Security and Privacy[C]. IEEE Transactions on Mobile Computing.2009.8(8):1052-1062
    • (2009) IEEE Transactions On Mobile Computing , vol.8 , Issue.8 , pp. 1052-1062
    • Sun, H.1    Ting, W.2
  • 18
    • 64249134316 scopus 로고    scopus 로고
    • Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
    • D Han, D Kwon. "Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards" Computer Standards & Interfaces[J]. 2009.31(4):648-652
    • (2009) Computer Standards & Interfaces[J] , vol.31 , Issue.4 , pp. 648-652
    • Han, D.1    Kwon, D.2
  • 20
    • 79952383750 scopus 로고    scopus 로고
    • AVISPA
    • AVISPA v1.1 User Manual, 2006
    • (2006) User Manual , vol.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.