메뉴 건너뛰기




Volumn 9, Issue 2, 2012, Pages 289-302

Survivability experiment and attack characterization for RFID

Author keywords

and adversary; experiment; quantification; RFID; survivability

Indexed keywords

EXPERIMENTS; RANDOM PROCESSES; STOCHASTIC MODELS; STOCHASTIC SYSTEMS;

EID: 84856274931     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2011.30     Document Type: Article
Times cited : (9)

References (29)
  • 4
    • 33748108997 scopus 로고    scopus 로고
    • Dependability through assured reconfiguration in embedded system software
    • DOI 10.1109/TDSC.2006.33, 1673378
    • E. Strunk and J. Knight, "Dependability Through Assured Reconfiguration in Embedded Systems Software," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 3, pp. 172-187, July 2006. (Pubitemid 44304206)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.3 , pp. 172-187
    • Strunk, E.A.1    Knight, J.C.2
  • 5
    • 0034228685 scopus 로고    scopus 로고
    • Reliability and survivability of wireless and mobile networks
    • July
    • A. Snow, U. Varshney, and A. Malloy, "Reliability and Survivability of Wireless and Mobile Networks," Computer, vol. 33, no. 7, pp. 49-55, July 2000.
    • (2000) Computer , vol.33 , Issue.7 , pp. 49-55
    • Snow, A.1    Varshney, U.2    Malloy, A.3
  • 8
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas Comm., vol. 24, no. 2, pp. 381-394, Feb. 2006. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 9
    • 33947538532 scopus 로고    scopus 로고
    • Protocols for RFID tag/reader authentication
    • DOI 10.1016/j.dss.2007.01.003, PII S0167923607000103, Integrated Decision Support
    • S. Piramuthu, "Protocols for RFID Tag/Reader Authentication," Decision Support System, vol. 43, pp. 897-914, 2007. (Pubitemid 46466997)
    • (2007) Decision Support Systems , vol.43 , Issue.3 , pp. 897-914
    • Piramuthu, S.1
  • 10
    • 84977783611 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • Dec.
    • C. Lim and T. Kwon, "Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer," Proc. Eighth Conf. Information Comm. Security, pp. 1-20, Dec. 2006.
    • (2006) Proc. Eighth Conf. Information Comm. Security , pp. 1-20
    • Lim, C.1    Kwon, T.2
  • 11
    • 70349284581 scopus 로고    scopus 로고
    • Secure Human Identification Protocols
    • Advances in Cryptology - ASIACRYPT 2001
    • N. Hopper and M. Blum, "Secure Human Identification Protocols," Proc. Conf. Advances in Cryptology - ASIA CRYPT 2001, vol. 2248, C. Boyd ed., pp. 52-66, 2001. (Pubitemid 33371178)
    • (2002) Lecture Notes in Computer Science , Issue.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 12
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • V. Shoup ed.
    • A. Juels and S. Weis, "Authenticating Pervasive Devices with Human Protocols," Proc. Advances in Cryptology-Crypto 05, V. Shoup ed., pp. 293-308, 2005.
    • (2005) Proc. Advances in Cryptology-crypto 05 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 13
    • 33746104831 scopus 로고    scopus 로고
    • Parallel and concurrent security of the HB and HB++ protocols
    • Springer
    • J. Katz and J. Shin, "Parallel and Concurrent Security of the HB and HB++ Protocols," Advances in Cryptology - EURO CRYPT 2006, vol. 4004, pp. 73-87, Springer, 2006.
    • (2006) Advances in Cryptology - EURO CRYPT 2006 , vol.4004 , pp. 73-87
    • Katz, J.1    Shin, J.2
  • 15
    • 26444435642 scopus 로고    scopus 로고
    • RFID guardian: A battery-powered mobile device for RFID privacy management
    • Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
    • M. Rieback, B. Crispo, and A. Tanenbaum, "RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management," Proc. Australian Conf. Information Security Privacy, vol. 3574, pp. 184-194, July 2005. (Pubitemid 41431781)
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 184-194
    • Rieback, M.R.1    Crispo, B.2    Tanenbaum, A.S.3
  • 18
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar.
    • D. Dolev and A. C. Yao, "On the security of public key protocols" IEEE Trans. Information Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
    • (1983) IEEE Trans. Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 19
    • 85070912494 scopus 로고    scopus 로고
    • Attack-potential-based survivability modeling for high-consequence systems
    • Mar.
    • J. McDermott, "Attack-Potential-Based Survivability Modeling for High-Consequence Systems," Proc. Third IEEE Int'l Information Assurance Workshop, pp. 119-130, Mar. 2005.
    • (2005) Proc. Third IEEE Int'l Information Assurance Workshop , pp. 119-130
    • McDermott, J.1
  • 20
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • E. Jonsson and T. Olovssson, "A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior," IEEE Trans. Software Eng., vol. 23, no. 4, pp. 235-245, Apr. 1997. (Pubitemid 127828291)
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 22
    • 0034593315 scopus 로고    scopus 로고
    • Adversary work factor as a metric for information assurance
    • G. Schudel and B. Wood, "Adversary Work Factor as a Metric for Information Assurance," Proc. Workshop New Security Paradigms, pp. 23-30, 2001.
    • (2001) Proc. Workshop New Security Paradigms , pp. 23-30
    • Schudel, G.1    Wood, B.2
  • 24
    • 50249164439 scopus 로고    scopus 로고
    • A secure RFID identity reporting protocol for physical attack resistance
    • July
    • Z. Liu and D. Peng, "A Secure RFID Identity Reporting Protocol for Physical Attack Resistance," J. Comm., vol. 1, p. 4, July 2006.
    • (2006) J. Comm. , vol.1 , pp. 4
    • Liu, Z.1    Peng, D.2
  • 29
    • 84856242538 scopus 로고    scopus 로고
    • A holistic approach for specification of security requirements in ubiquitous computing
    • Y. Zuo, "A Holistic Approach for Specification of Security Requirements in Ubiquitous Computing," Proc. Int'l Conf. Information Systems (ICIS'10) p. 18, 2010.
    • (2010) Proc. Int'l Conf. Information Systems (ICIS'10) , pp. 18
    • Zuo, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.