메뉴 건너뛰기




Volumn 35, Issue 2, 2012, Pages 826-843

Privacy-friendly synchronized ultralightweight authentication protocols in the storm

Author keywords

Authentication; Cryptography; Lightweight protocols; Privacy; Radio frequency identification

Indexed keywords

AUTHENTICATION PROTOCOLS; CRYPTOGRAPHIC PRIMITIVES; EFFICIENT AUTHENTICATION; LIGHTWEIGHT PROTOCOLS; PRIVATE AUTHENTICATION; RADIO FREQUENCIES; RF-ID TAGS; STATE OF THE ART;

EID: 84856217397     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2011.12.001     Document Type: Article
Times cited : (44)

References (67)
  • 3
    • 33744939250 scopus 로고    scopus 로고
    • Adversary model for radio frequency identification
    • Lausanne, Switzerland: Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC); September
    • Avoine G. Adversary model for radio frequency identification. Technical report LASEC-REPORT-2005-001. Lausanne, Switzerland: Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC); September 2005.
    • (2005) Technical Report LASEC-REPORT-2005-001
    • Avoine, G.1
  • 4
    • 84981171135 scopus 로고    scopus 로고
    • January
    • Avoine G. January 2011. RFID lounge 〈 http://www.avoine.net/rfid/ 〉.
    • (2011) RFID Lounge
    • Avoine, G.1
  • 11
    • 77953701050 scopus 로고    scopus 로고
    • Data synchronization in privacy-preserving RFID authentication schemes
    • Budapest, Hungary; July
    • Canard S, Coisel I. Data synchronization in privacy-preserving RFID authentication schemes. In: Workshop on RFID security - RFIDSec08. Budapest, Hungary; July 2008.
    • (2008) Workshop on RFID Security - RFIDSec08
    • Canard, S.1    Coisel, I.2
  • 14
    • 34547630116 scopus 로고    scopus 로고
    • Secure anonymous RFID authentication protocols
    • Tallahassee, Florida, USA: Florida State University, Department of Computer Science
    • Chatmon C, van Le T, Burmester M. Secure anonymous RFID authentication protocols. Technical report TR-060112. Tallahassee, Florida, USA: Florida State University, Department of Computer Science; 2006.
    • (2006) Technical Report TR-060112
    • Chatmon, C.1    Van Le, T.2    Burmester, M.3
  • 16
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • DOI 10.1109/TDSC.2007.70226
    • H.-Y. Chien SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity IEEE Transactions on Dependable and Secure Computing 4 4 2007 337 340 (Pubitemid 350125898)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 17
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • DOI 10.1016/j.csi.2006.04.004, PII S092054890600064X
    • H.-Y. Chien, and C.-H. Chen Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards Computer Standards & Interfaces 29 2 2007 254 259 (Pubitemid 44829930)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 18
    • 78650135521 scopus 로고    scopus 로고
    • Security of ultra-lightweight RFID authentication protocols and its improvements
    • H.-Y. Chien, and C.-W. Huang Security of ultra-lightweight RFID authentication protocols and its improvements ACM SIGOPS Operating Systems Review 41 4 2007 86
    • (2007) ACM SIGOPS Operating Systems Review , vol.41 , Issue.4 , pp. 86
    • Chien, H.-Y.1    Huang, C.-W.2
  • 20
    • 82955160860 scopus 로고    scopus 로고
    • From weaknesses to secret disclosure in a recent ultra-lightweight RFID authentication protocol
    • DArco P, De Santis A. From weaknesses to secret disclosure in a recent ultra-lightweight RFID authentication protocol. Cryptology ePrint Archive, Report 2008/470, 〈 http://eprint.iacr.org/ 〉; 2008.
    • (2008) Cryptology EPrint Archive, Report 2008/470
    • Darco, P.1    De Santis, A.2
  • 23
    • 27644472569 scopus 로고    scopus 로고
    • +: A provably secure lightweight authentication protocol
    • DOI 10.1049/el:20052622
    • H. Gilbert, M. Robshaw, and H. Sibert Active attack against HB: a provably secure lightweight authentication protocol Electronics Letters 41 21 2005 1169 1170 (Pubitemid 41560540)
    • (2005) Electronics Letters , vol.41 , Issue.21 , pp. 1169-1170
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 24
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • R. Sandhu, R. Thomas, IEEE Computer Society Orlando, Florida, USA
    • D. Henrici, and P. Müller Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers R. Sandhu, R. Thomas, International workshop on pervasive computing and communication security - PerSec 2004 2004 IEEE Computer Society Orlando, Florida, USA 149 153
    • (2004) International Workshop on Pervasive Computing and Communication Security - PerSec 2004 , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 28
    • 70349284581 scopus 로고    scopus 로고
    • Secure Human Identification Protocols
    • Advances in Cryptology - ASIACRYPT 2001
    • Hopper N, Blum M. Secure human identification protocols. Advances in cryptology - ASIACRYPT 2001. p. 5266; 2001. (Pubitemid 33371178)
    • (2002) Lecture Notes in Computer Science , Issue.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 31
    • 18744409344 scopus 로고    scopus 로고
    • The blocker tag: Selective blocking of RFID tags for consumer privacy
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • A. Juels, R. Rivest, and M. Szydlo The blocker tag: selective blocking of RFID tags for consumer privacy S. Jajodia, V. Atluri, T. Jaeger, Conference on computer and communications security - ACM CCS03 2003 ACM Press Washington, DC, USA 103 111 (Pubitemid 40673793)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 103-111
    • Juels, A.1    Rivest, R.L.2    Szydlo, M.3
  • 32
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • V. Shoup, IACR, Springer Santa Barbara, California, USA
    • A. Juels, and S. Weis Authenticating pervasive devices with human protocols V. Shoup, Advances in cryptology - CRYPTO05. Lecture notes in computer science vol. 3126 2005 IACR, Springer Santa Barbara, California, USA 293 308
    • (2005) Advances in Cryptology - CRYPTO05. Lecture Notes in Computer Science , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 37
    • 34548815120 scopus 로고    scopus 로고
    • Are standards compliant elliptic curve cryptosystems feasible on RFID?
    • Graz, Austria: Ecrypt; July
    • Kumar S, Paar C. Are standards compliant elliptic curve cryptosystems feasible on RFID? In: Workshop on RFID security - RFIDSec06. Graz, Austria: Ecrypt; July 2006.
    • (2006) Workshop on RFID Security - RFIDSec06
    • Kumar, S.1    Paar, C.2
  • 40
    • 70450286845 scopus 로고    scopus 로고
    • Security analysis on a family of ultra-lightweight RFID authentication protocols
    • T. Li, G. Wang, and R.H. Deng Security analysis on a family of ultra-lightweight RFID authentication protocols Journal of Software 3 3 2008 1
    • (2008) Journal of Software , vol.3 , Issue.3 , pp. 1
    • Li, T.1    Wang, G.2    Deng, R.H.3
  • 42
    • 36248977046 scopus 로고    scopus 로고
    • Security analysis of two ultra-lightweight RFID authentication protocols
    • H. Venter, M. Eloff, L. Labuschagne, J. Eloff, R. Von Solms, IFIP, Springer Sandton, Gauteng, South Africa
    • T. Li, and G. Wang Security analysis of two ultra-lightweight RFID authentication protocols H. Venter, M. Eloff, L. Labuschagne, J. Eloff, R. Von Solms, IFIP TC-11 22nd international information security conference - SEC 2007 vol. 232 2007 IFIP, Springer Sandton, Gauteng, South Africa 109 120
    • (2007) IFIP TC-11 22nd International Information Security Conference - SEC 2007 , vol.232 , pp. 109-120
    • Li, T.1    Wang, G.2
  • 43
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID issues, practices, and architectures
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • D. Molnar, and D. Wagner Privacy and security in library RFID: issues, practices, and architectures V. Atluri, B. Pfitzmann, P.D. McDaniel, Conference on computer and communications security - ACM CCS04 2004 ACM Press Washington, DC, USA 210 219 (Pubitemid 40338202)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 44
    • 34247523203 scopus 로고    scopus 로고
    • HB-MP: A further step in the HB-family of lightweight authentication protocols
    • DOI 10.1016/j.comnet.2007.01.011, PII S1389128607000242, Advances in Smart Cards
    • J. Munilla, and A. Peinado HB-MP: a further step in the HB-family of lightweight authentication protocols Computer Networks 51 9 2007 2262 2267 (Pubitemid 46654842)
    • (2007) Computer Networks , vol.51 , Issue.9 , pp. 2262-2267
    • Munilla, J.1    Peinado, A.2
  • 46
    • 84856218376 scopus 로고    scopus 로고
    • SL2S2002; SL2S2102. ICODE SLIX; January
    • Datasheet NXP. SL2S2002; SL2S2102. ICODE SLIX; January 2011.
    • (2011) Datasheet NXP
  • 47
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to privacy-friendly tags
    • MIT Massachusetts, USA
    • M. Ohkubo, K. Suzuki, and S. Kinoshita Cryptographic approach to privacy-friendly tags RFID privacy workshop 2003 MIT Massachusetts, USA
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 54
    • 70450265312 scopus 로고    scopus 로고
    • Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI
    • R.C.-W. Phan Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI IEEE Transactions on Dependable and Secure Computing 6 2008 316 320
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.6 , pp. 316-320
    • Phan, R.C.-W.1
  • 55
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
    • K. Rhee, J. Kwak, S. Kim, and D. Won Challenge-Response based RFID authentication protocol for distributed database environment D. Hutter, M. Ullmann, International conference on security in pervasive computing - SPC 2005. Lecture notes in computer science vol. 3450 2005 Springer Boppard, Germany 70 84 (Pubitemid 41274193)
    • (2005) Lecture Notes in Computer Science , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 59
    • 44649155143 scopus 로고    scopus 로고
    • A family of dunces: Trivial RFID identification and authentication protocols
    • Tsudik G. A family of dunces: trivial RFID identification and authentication protocols. Cryptology ePrint Archive, Report 2006/015; 2007.
    • (2007) Cryptology EPrint Archive, Report 2006/015
    • Tsudik, G.1
  • 65


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.