메뉴 건너뛰기




Volumn , Issue , 2011, Pages 581-584

Tag impersonation attack on two RFID mutual authentication protocols

Author keywords

ARAP; Authentication; RFID; Tag impersonation; WG 7

Indexed keywords

ARAP; DENIAL OF SERVICE; EXCLUSIVE-OR; IMPERSONATION ATTACK; MAN IN THE MIDDLE ATTACKS; MUTUAL AUTHENTICATION; PASSIVE ATTACKS; RANDOM VALUES; RFID SYSTEMS; TAG IMPERSONATION; USER PRIVACY; WG-7;

EID: 80455173519     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2011.87     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 1
    • 78751647681 scopus 로고    scopus 로고
    • The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
    • Y.-Y. Chen, M.-L. Tsai, and J.-K. Jan. The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. In Computer Communication, volume 34, pages 250-256, 2011.
    • (2011) Computer Communication , vol.34 , pp. 250-256
    • Chen, Y.-Y.1    Tsai, M.-L.2    Jan, J.-K.3
  • 2
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • DOI 10.1109/TDSC.2007.70226
    • H.-Y. Chien. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Transactions on Dependable and Secure Computing, 4(4):337-340, December 2007. (Pubitemid 350125898)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 3
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • doi:10.1016/j.comcom.2010.02.029
    • J.-S. Cho, S.-S. Yeo, and S. K. Kim. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. In Comput.Commun,doi:10.1016/j.comcom.2010.02.029, 2010.
    • (2010) Comput.Commun
    • Cho, J.-S.1    Yeo, S.-S.2    Kim, S.K.3
  • 5
    • 34548162681 scopus 로고    scopus 로고
    • Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol
    • IEEE Computer Society
    • T. Li and R. H. Deng. Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol. In ARES, pages 238-245. IEEE Computer Society, 2007.
    • (2007) ARES , pp. 238-245
    • Li, T.1    Deng, R.H.2
  • 6
    • 79551648752 scopus 로고    scopus 로고
    • A lightweight stream cipher WG-7 for RFID encryption and authentication
    • Y. Luo, Q. Chai, G. Gong, and X. Lai. A lightweight Stream Cipher WG-7 for RFID Encryption and Authentication. In IEEE Globecom 2010 proceedings, 2010.
    • (2010) IEEE Globecom 2010 Proceedings
    • Luo, Y.1    Chai, Q.2    Gong, G.3    Lai, X.4
  • 7
    • 70350625235 scopus 로고    scopus 로고
    • Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
    • K.-I. Chung, K. Sohn, and M. Yung, editors, WISA, Springer
    • P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. In K.-I. Chung, K. Sohn, and M. Yung, editors, WISA, volume 5379 of LNCS, pages 56-68. Springer, 2008.
    • (2008) LNCS , vol.5379 , pp. 56-68
    • Peris-Lopez, P.1    Castro, J.C.H.2    Estévez-Tapiador, J.M.3    Ribagorda, A.4
  • 9
    • 65649112157 scopus 로고    scopus 로고
    • Security analysis of the Song Mitchell authentication protocol for low-cost RFID tags
    • P. Rizomiliotis, E. Rekleitis, and S. Gritzalis. Security analysis of the Song Mitchell authentication protocol for low-cost RFID tags. In IEEE Communications Letters, volume 13, pages 274-276, 2009.
    • (2009) IEEE Communications Letters , vol.13 , pp. 274-276
    • Rizomiliotis, P.1    Rekleitis, E.2    Gritzalis, S.3
  • 10
    • 66649092625 scopus 로고    scopus 로고
    • FLMAP: A fast lightweight mutual authentication protocol for RFID systems
    • IEEE
    • A. Sadighian and R. Jalili. FLMAP: A fast lightweight mutual authentication protocol for RFID systems. In ICON, pages 1-6. IEEE, 2008.
    • (2008) ICON , pp. 1-6
    • Sadighian, A.1    Jalili, R.2
  • 11
    • 70449478156 scopus 로고    scopus 로고
    • AFMAP: Anonymous forward-secure mutual authentication protocols for RFID systems
    • R. Falk, W. Goudalo, E. Y. Chen, R. Savola, and M. Popescu, editors, Athens, Greece. IEEE Computer Society
    • A. Sadighian and R. Jalili. AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID systems. In R. Falk, W. Goudalo, E. Y. Chen, R. Savola, and M. Popescu, editors, The Third IEEE International Conference on Emerging Security Information, Systems and Technologies(SECURWARE 2009), pages 31-36, Athens, Greece, 2009. IEEE Computer Society.
    • (2009) The Third IEEE International Conference on Emerging Security Information, Systems and Technologies(SECURWARE 2009) , pp. 31-36
    • Sadighian, A.1    Jalili, R.2
  • 18
    • 56749103027 scopus 로고    scopus 로고
    • RFID authentication protocol for low-cost tags
    • B. Song and C. J. Mitchell. RFID Authentication Protocol for Low-cost Tags. In WiSec' 08, pages 140-147, 2008.
    • (2008) WiSec'08 , pp. 140-147
    • Song, B.1    Mitchell, C.J.2
  • 19
    • 67649484364 scopus 로고    scopus 로고
    • A Gen2-based RFID authentication protocol for security and privacy
    • H.-M. Sun and W.-C. Ting. A Gen2-Based RFID Authentication Protocol for Security and Privacy. In IEEE Transactions On Mobile Computing, volume 8, pages 1052-1062, 2009.
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , pp. 1052-1062
    • Sun, H.-M.1    Ting, W.-C.2
  • 20
    • 85008055668 scopus 로고    scopus 로고
    • Secure and serverless RFID authentication and search protocols
    • C. C. Tan, B. Sheng, and Q. Li. Secure and Serverless RFID Authentication and Search Protocols. IEEE Transactions on Wireless Communications, 7(4):1400-1407, 2008.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1400-1407
    • Tan, C.C.1    Sheng, B.2    Li, Q.3
  • 21
    • 79953083437 scopus 로고    scopus 로고
    • A mutual authentication protocol for rfid
    • C.-H. Wei, M.-S. Hwang, and A. Y. Chin. A mutual authentication protocol for rfid. IT Professional, 13(2):20-24, 2011.
    • (2011) IT Professional , vol.13 , Issue.2 , pp. 20-24
    • Wei, C.-H.1    Hwang, M.-S.2    Chin, A.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.