메뉴 건너뛰기




Volumn 9, Issue 2, 2011, Pages 208-223

An authentication protocol for low-cost RFID tags

Author keywords

Authentication; Denial of service; Mobile communication; Privacy; RFID; Security

Indexed keywords

DENIAL OF SERVICE; MOBILE COMMUNICATION; PRIVACY; RFID; SECURITY;

EID: 79956297141     PISSN: 1470949X     EISSN: None     Source Type: Journal    
DOI: 10.1504/IJMC.2011.040146     Document Type: Article
Times cited : (17)

References (30)
  • 2
    • 77949553535 scopus 로고    scopus 로고
    • Cryptanalysis of two RFID authentication protocols
    • Cao, T. and Shen, P. (2009) Cryptanalysis of two RFID authentication protocols', International Journal of Network Security, Vol. 9, pp.95-100.
    • (2009) International Journal of Network Security , vol.9 , pp. 95-100
    • Cao, T.1    Shen, P.2
  • 3
    • 79953072900 scopus 로고    scopus 로고
    • RFID ownership transfer authorization systems conforming epcglobal class-1 generation-2 standards
    • Chen, C.L., Lai, Y.L., Chen, C.C., Deng, Y.Y. and Hwang, Y.C. (2011) RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards', International Journal of Network Security, Vol. 13, No. 1, pp.41-48.
    • (2011) International Journal of Network Security , vol.13 , Issue.1 , pp. 41-48
    • Chen, C.L.1    Lai, Y.L.2    Chen, C.C.3    Deng, Y.Y.4    Hwang, Y.C.5
  • 4
    • 37849043107 scopus 로고    scopus 로고
    • 'RFID in retail: A framework for examining consumers' ethical perceptions
    • Chen, J.V. and Pfleuger Jr., P.P. (2008) RFID in retail: a framework for examining consumers' ethical perceptions', International Journal of Mobile Communications, Vol. 6, No. 1,pp.53-66.
    • (2008) International Journal of Mobile Communications , vol.6 , Issue.1 , pp. 53-66
    • Chen, J.V.1    Pfleuger Jr., P.P.2
  • 5
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • Chen, Y., Chou, J.S. and Sun, H.M. (2008) A novel mutual authentication scheme based on quadratic residues for RFID systems', Computer Networks, Vol. 52, No. 12, pp.2373-2380.
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2373-2380
    • Chen, Y.1    Chou, J.S.2    Sun, H.M.3
  • 6
    • 38149009007 scopus 로고    scopus 로고
    • The state of RFID for eRective baggage tracking in the airline industry
    • DeVries, P.D. (2008) The state of RFID for eRective baggage tracking in the airline industry', International Journal of Mobile Communications, Vol. 6, No. 2, pp.151-164.
    • (2008) International Journal of Mobile Communications , vol.6 , Issue.2 , pp. 151-164
    • DeVries, P.D.1
  • 7
    • 38149049144 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
    • Han, S., Potdar, V. and Chang, E. (2007) Mutual authentication protocol for RFID tags based on synchronized secret information with monitor', Lecture Notes in Computer Science, Vol. 4707, pp.227-238.
    • (2007) Lecture Notes in Computer Science , vol.4707 , pp. 227-238
    • Han, S.1    Potdar, V.2    Chang, E.3
  • 8
    • 33646261491 scopus 로고    scopus 로고
    • Authenticated encryption schemes: Current status and key issues
    • Hwang, M.S. and Liu, C.Y. (2005) Authenticated encryption schemes: current status and key issues', International Journal of Network Security, Vol. 1, pp.61-73.
    • (2005) International Journal of Network Security , vol.1 , pp. 61-73
    • Hwang, M.S.1    Liu, C.Y.2
  • 10
    • 79953096361 scopus 로고    scopus 로고
    • Privacy and security requirements for RFID applications
    • Hwang, M.S., Wei, C.H. and Lee, C.Y. (2009b) Privacy and security requirements for RFID applications', Journal of Computers, Vol. 20, No. 3, pp.55-60.
    • (2009) Journal of Computers , vol.20 , Issue.3 , pp. 55-60
    • Hwang, M.S.1    Wei, C.H.2    Lee, C.Y.3
  • 11
    • 71649104505 scopus 로고    scopus 로고
    • DoS-resistant ID-based password authentication scheme using smart cards
    • Hwang, M.S., Chong, S.K. and Chen, T.Y. (2005) DoS-resistant ID-based password authentication scheme using smart cards', Journal of Systems and Software, Vol. 83, pp.163-172.
    • (2005) Journal of Systems and Software , vol.83 , pp. 163-172
    • Hwang, M.S.1    Chong, S.K.2    Chen, T.Y.3
  • 12
    • 64149092115 scopus 로고    scopus 로고
    • Robust and efficient authenticated key agreement in mobile communications
    • Juang, W.S. and Wu, J.L. (2009) Robust and efficient authenticated key agreement in mobile communications', International Journal of Mobile Communications, Vol. 7, No. 5, pp.562-579.
    • (2009) International Journal of Mobile Communications , vol.7 , Issue.5 , pp. 562-579
    • Juang, W.S.1    Wu, J.L.2
  • 14
    • 76449091075 scopus 로고    scopus 로고
    • Enhanced monitoring of tuberculosis patients by using RFID technologies
    • Lai, C.L., Fang, K. and Chien, S.W. (2010) Enhanced monitoring of tuberculosis patients by using RFID technologies', International Journal of Mobile Communications, Vol. 8, No. 2, pp.244-256.
    • (2010) International Journal of Mobile Communications , vol.8 , Issue.2 , pp. 244-256
    • Lai, C.L.1    Fang, K.2    Chien, S.W.3
  • 15
    • 33847741124 scopus 로고    scopus 로고
    • The history of RFID
    • DOI 10.1109/MP.2005.1549751
    • Landt, J. (2005) The history of RFID', IEEE Potentials, Vol. 24, No. 4, pp.8-11. (Pubitemid 46504862)
    • (2005) IEEE Potentials , vol.24 , Issue.4 , pp. 8-11
    • Landt, J.1
  • 16
    • 24944582157 scopus 로고    scopus 로고
    • Efficient authentication for low-cost RFID systems
    • Computational Science and Its Applications - ICCSA 2005: International Conference, Proceeedings
    • Lee, S.M., Hwang, Y.J., Lee, D.H. and Lim, J.I. (2005) Efficient authentication for low-cost RFID systems', Lecture Notes in Computer Science, Vol. 3480, pp.619-627. (Pubitemid 41313878)
    • (2005) Lecture Notes in Computer Science , vol.3480 , Issue.1 , pp. 619-627
    • Lee, S.M.1    Hwang, Y.J.2    Lee, D.H.3    Lim, J.I.4
  • 17
    • 79953125329 scopus 로고    scopus 로고
    • An online RFID laboratory learning environment
    • Lehlou, N. (2009) An online RFID laboratory learning environment', IEEE Transactions on Learning Technologies, Vol. 2, pp.295-303.
    • (2009) IEEE Transactions on Learning Technologies , vol.2 , pp. 295-303
    • Lehlou, N.1
  • 18
    • 84977783611 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • Lim, C.H. and Takeyoung, K. (2006) Strong and robust RFID authentication enabling perfect ownership transfer', Lecture Notes in Computer Science, Vol. 4307, pp.1-20.
    • (2006) Lecture Notes in Computer Science , vol.4307 , pp. 1-20
    • Lim, C.H.1    Takeyoung, K.2
  • 22
    • 67650870141 scopus 로고    scopus 로고
    • TK-AKA: Using temporary key on authentication and key agreement protocol on UMTS
    • Ou, H.H., Lin, I.C., Hwang, M.S. and Jan, J.K. (2009) TK-AKA: Using temporary key on authentication and key agreement protocol on UMTS', International Journal of Network Management, Vol. 19, pp.291-303.
    • (2009) International Journal of Network Management , vol.19 , pp. 291-303
    • Ou, H.H.1    Lin, I.C.2    Hwang, M.S.3    Jan, J.K.4
  • 25
    • 65649112157 scopus 로고    scopus 로고
    • Security analysis of the song-mitchell authentication protocol for low-cost RFID tags
    • Rizomiliotis, P., Rekleitis, E. and Gritzalis, S. (2009) Security analysis of the song-mitchell authentication protocol for low-cost RFID tags', IEEE Communications Letters, Vol. 13, No. 4, pp.274-276.
    • (2009) IEEE Communications Letters , vol.13 , Issue.4 , pp. 274-276
    • Rizomiliotis, P.1    Rekleitis, E.2    Gritzalis, S.3
  • 26
    • 32444435813 scopus 로고    scopus 로고
    • Radio frequency identification (RFID)
    • DOI 10.1016/j.cose.2005.12.003, PII S016740480500204X
    • Roberts, C.M. (2006) Radio frequency identification (RFID)', Computers & Security, Vol. 25, No. 1, pp.18-26. (Pubitemid 43227228)
    • (2006) Computers and Security , vol.25 , Issue.1 , pp. 18-26
    • Roberts, C.M.1
  • 28
    • 78751649779 scopus 로고    scopus 로고
    • Improvement of the RFID authentication scheme based on quadratic residues
    • Yeh, T.C., Wu, C.H. and Tseng, Y.M. (2010) Improvement of the RFID authentication scheme based on quadratic residues', Computer Communications, Vol. 34, No. 3, pp.337-341.
    • (2010) Computer Communications , vol.34 , Issue.3 , pp. 337-341
    • Yeh, T.C.1    Wu, C.H.2    Tseng, Y.M.3
  • 29
    • 70349582554 scopus 로고    scopus 로고
    • Protecting your privacy with a mobile agent device in RFID environment
    • Yeo, S.S., Kim, S.C. and Kim, S.K. (2009) Protecting your privacy with a mobile agent device in RFID environment', Wireless Personal Communications, Vol. 51, No. 1, pp.165-178.
    • (2009) Wireless Personal Communications , vol.51 , Issue.1 , pp. 165-178
    • Yeo, S.S.1    Kim, S.C.2    Kim, S.K.3
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.