메뉴 건너뛰기




Volumn 23, Issue 8, 2012, Pages 1536-1550

Scalable RFID systems: A privacy-preserving protocol with constant-time identification

Author keywords

authentication; identification; privacy; RFID; scalability

Indexed keywords

ADDRESS TIME; COMMUNICATION OVERHEADS; PRIVACY-PRESERVING AUTHENTICATION; PRIVACY-PRESERVING PROTOCOLS; RFID SYSTEMS; SEARCH COMPLEXITY; SECRET INFORMATION; SYMMETRIC KEYS; TAG IDENTIFICATION; TIME EFFICIENCIES; WIRELESS CHANNEL;

EID: 84863515660     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2011.290     Document Type: Article
Times cited : (41)

References (43)
  • 2
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • DOI 10.1109/MSP.2005.78
    • S. Garfinkel, A. Juels, and R. Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions," IEEE Security & Privacy Magazine, vol. 3, no. 3, pp. 34-43, May/June 2005. (Pubitemid 40860471)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 6
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • DOI 10.1109/TDSC.2007.70226
    • H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 4, pp. 337-340, Oct.-Dec. 2007. (Pubitemid 350125898)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 8
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID issues, practices, and architectures
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures," Proc. 11th ACM Conf. Computer and Comm. Security (CCS '04), pp. 210-219, 2004. (Pubitemid 40338202)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 9
    • 33644907731 scopus 로고    scopus 로고
    • Adaptive binary splitting for efficient RFID tag anti-collision
    • DOI 10.1109/LCOMM.2006.1603365
    • J. Myung, W. Lee, and J. Srivastava, "Adaptive Binary Splitting for Efficient RFID Tag Anti-Collision," IEEE Comm. Letters, vol. 10, no. 3, pp. 144-146, Mar. 2006. (Pubitemid 43379997)
    • (2006) IEEE Communications Letters , vol.10 , Issue.3 , pp. 144-146
    • Myung, J.1    Lee, W.2    Srivastava, J.3
  • 14
    • 70349666896 scopus 로고    scopus 로고
    • Action: Breaking the privacy barrier for rfid systems
    • L. Lu, J. Han, R. Xiao, and Y. Liu, "ACTION: Breaking the Privacy Barrier for RFID Systems," Proc. IEEE INFOCOM '09, pp. 1953-1961, 2009.
    • (2009) Proc. IEEE INFOCOM '09 , pp. 1953-1961
    • Lu, L.1    Han, J.2    Xiao, R.3    Liu, Y.4
  • 16
    • 78049383154 scopus 로고    scopus 로고
    • Privacy versus scalability in radio frequency identification systems
    • B. Alomair and R. Poovendran, "Privacy Versus Scalability in Radio Frequency Identification Systems," Computer Comm., vol. 33, no. 18, pp. 2155-2163, 2010.
    • (2010) Computer Comm. , vol.33 , Issue.18 , pp. 2155-2163
    • Alomair, B.1    Poovendran, R.2
  • 21
    • 77953302294 scopus 로고    scopus 로고
    • Refresh: Weak privacy model for rfid systems
    • L. Lu, Y. Liu, and X. Li, "Refresh: Weak Privacy Model for Rfid Systems," Proc. IEEE INFOCOM '10, pp. 1-9, 2010.
    • (2010) Proc. IEEE INFOCOM '10 , pp. 1-9
    • Lu, L.1    Liu, Y.2    Li, X.3
  • 22
    • 79952959811 scopus 로고    scopus 로고
    • Securing low-cost rfid systems: An unconditionally secure approach
    • B. Alomair, L. Lazos, and R. Poovendran, "Securing Low-Cost RFID Systems: An Unconditionally Secure Approach," J. Computer Security, vol. 19, no. 2, pp. 229-256, 2011.
    • (2011) J. Computer Security , vol.19 , Issue.2 , pp. 229-256
    • Alomair, B.1    Lazos, L.2    Poovendran, R.3
  • 23
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags (extended abstract)
    • Security in Communication Networks - 4th International Conference, SCN 2004
    • A. Juels, "Minimalist Cryptography for Low-Cost RFID Tags," Proc. Int'l Conf. Security in Comm. Networks, pp. 149-164, 2005. (Pubitemid 41191003)
    • (2005) Lecture Notes in Computer Science , vol.3352 , pp. 149-164
    • Juels, A.1
  • 32
    • 33744957484 scopus 로고    scopus 로고
    • Technical Report LASEC-REPORT-2005-001, Swiss Fed. Inst. of Technology (EPFL), Security and Cryptography Laboratory (LASEC)
    • G. Avoine, "Adversarial Model for Radio Frequency Identification," Technical Report LASEC-REPORT-2005-001, Swiss Fed. Inst. of Technology (EPFL), Security and Cryptography Laboratory (LASEC), 2005.
    • (2005) Adversarial Model for Radio Frequency Identification
    • Avoine, G.1
  • 36
    • 84863526106 scopus 로고    scopus 로고
    • http://ti.com/rfid/shtml/doc-center-datasheets.shtml, 2012.
    • (2012)
  • 37
    • 45949097329 scopus 로고    scopus 로고
    • Report from the first workshop on extremely large databases
    • J. Becla and K.-T. Lim, "Report from the First Workshop on Extremely Large Databases," Data Science J., vol. 7, pp. 1-13, 2008.
    • (2008) Data Science J. , vol.7 , pp. 1-13
    • Becla, J.1    Lim, K.-T.2
  • 38
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 381-394, Feb. 2006. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 39
    • 78649313774 scopus 로고    scopus 로고
    • Physical-layer identification of uhf rfid tags
    • D. Zanetti, B. Danev, and S. Capkun, "Physical-Layer Identification of UHF RFID Tags," Proc. MobiCom '10, pp. 353-364, 2010.
    • (2010) Proc. MobiCom '10 , pp. 353-364
    • Zanetti, D.1    Danev, B.2    Capkun, S.3
  • 40
    • 84863526107 scopus 로고    scopus 로고
    • Rfid, privacy, and corporate data
    • "Rfid, Privacy, and Corporate Data," RFID J., 2003.
    • (2003) RFID J.
  • 42
    • 78650114205 scopus 로고    scopus 로고
    • A lightweight implementation of keccak hash function for radio-frequency identification applications
    • E.B. Kavun and T. Yalcin, "A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications," Proc. Sixth Int'l Workshop RFID Security (RFIDsec '10), pp. 258-269, 2010.
    • (2010) Proc. Sixth Int'l Workshop RFID Security (RFIDsec '10) , pp. 258-269
    • Kavun, E.B.1    Yalcin, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.