메뉴 건너뛰기




Volumn 4, Issue , 2010, Pages 49-60

An efficient ultralightweight authentication protocol for RFID systems

Author keywords

Authentication; Privacy; RFID; Security; Ultralightweight

Indexed keywords

AUTHENTICATION; DATA PRIVACY; RANDOM PROCESSES;

EID: 84865446917     PISSN: 18716431     EISSN: 18798101     Source Type: Book Series    
DOI: 10.3233/978-1-60750-485-6-49     Document Type: Article
Times cited : (26)

References (46)
  • 6
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection
    • C.-L. Chen and Y.-Y. Den, Conformation of EPC Class 1 Generation 2 Standards RFID System with Mutual Authentication and Privacy Protection, Engineering Applications of Artificial Intelligence 22(2009), 1284-1291.
    • (2009) Engineering Applications of Artificial Intelligence , vol.22 , pp. 1284-1291
    • Chen, C.-L.1    Den, Y.-Y.2
  • 7
    • 34347225586 scopus 로고    scopus 로고
    • RFID authentication protocol for anti-counterfeiting and privacy protection
    • Y.-C. Chen, W.-L. Wang and M.-S. Hwang, RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection, Proc. of the ICACT'07(2007), 255-259.
    • (2007) Proc. of the ICACT'07 , pp. 255-259
    • Chen, Y.-C.1    Wang, W.-L.2    Hwang, M.-S.3
  • 8
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • Y. Chen, J.-S. Chou and H.-M. Sun, A Novel Mutual Authentication Scheme based on Quadratic Residues for RFID Systems, Computer Networks 52, no. 12, 2008, 2373-2380.
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2373-2380
    • Chen, Y.1    Chou, J.-S.2    Sun, H.-M.3
  • 9
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • H.-Y. Chien and C.-H. Chen, Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards, Computer Standards & Interfaces 29(2007), 254-259.
    • (2007) Computer Standards & Interfaces , vol.29 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 10
    • 77952285870 scopus 로고    scopus 로고
    • Security of ultra-lightweight RFID authentication protocols and its improvements
    • H.-Y. Chien and C.-W. Huang, Security of Ultra-Lightweight RFID Authentication Protocols and its Improvements, ACMSIGOPS Operating System Review 41(2007), 83-86.
    • (2007) ACMSIGOPS Operating System Review , vol.41 , pp. 83-86
    • Chien, H.-Y.1    Huang, C.-W.2
  • 11
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • H.-Y. Chien, SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity, IEEE Trans. On Dependable and Secure Computing 4(2007), 337-340.
    • (2007) IEEE Trans. on Dependable and Secure Computing , vol.4 , pp. 337-340
    • Chien, H.-Y.1
  • 13
    • 82955160860 scopus 로고    scopus 로고
    • From weaknesses to secret disclosure in a recent ultra-lightweight RFID authentication protocol
    • P. D'Arco and A. De Santis, From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol, Cryptology ePrint Archive 470 (2008).
    • Cryptology EPrint Archive 470 (2008)
    • D'Arco, P.1    De Santis, A.2
  • 17
    • 33144487342 scopus 로고    scopus 로고
    • An active attack against HB+ - A provably secure lightweight authentication protocol
    • H. Gilbert, M. Robshaw and H. Sibert, An Active Attack against HB+ - A Provably Secure Lightweight Authentication Protocol, Cryptology ePrint Archive (2005).
    • (2005) Cryptology EPrint Archive
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 18
    • 64249134316 scopus 로고    scopus 로고
    • Vulnerability of an RFID authentication protocol conforming to EPC class 1 generation 2 standards
    • D. Han and D. Kwon, Vulnerability of An RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standards, Computer Standards & Interfaces 31(2009), 648-652.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 648-652
    • Han, D.1    Kwon, D.2
  • 19
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • D. Henrici and P. Müller, Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers, Proc. of the Workshop on IEEE PerSec'04 (2004).
    • (2004) Proc. of the Workshop on IEEE PerSec'04
    • Henrici, D.1    Müller, P.2
  • 21
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • A. Juels and S. A. Weis, Authenticating Pervasive Devices with Human Protocols, Proc. of the CRYPTO'05(2005), 293-308.
    • (2005) Proc. of the CRYPTO'05 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 23
    • 34247264920 scopus 로고    scopus 로고
    • Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security
    • H.-W. Kim, S.-Y. Lim and H.-J. Lee, Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security, Proc. of the ICHIT'06(2006), 718-723.
    • (2006) Proc. of the ICHIT'06 , pp. 718-723
    • Kim, H.-W.1    Lim, S.-Y.2    Lee, H.-J.3
  • 24
    • 34748848124 scopus 로고    scopus 로고
    • Universally composable and forward-secure RFID authentication and authenticated key exchange
    • T. V. Le, M. Burmester and B. de Medeiros, Universally Composable and Forward-secure RFID authentication and Authenticated Key Exchange, Proc. of the ASIACCS'07 (2007).
    • (2007) Proc. of the ASIACCS'07
    • Le, T.V.1    Burmester, M.2    De Medeiros, B.3
  • 25
    • 70449492478 scopus 로고    scopus 로고
    • A new ultralightweight RFID protocol with mutual authentication
    • Y.-C. Lee, Y.-C. Hsieh, P.-S. You and T.-C. Chen, A New Ultralightweight RFID Protocol with Mutual Authentication, Proc. of WASE'09(2009), 58-61.
    • (2009) Proc. of WASE'09 , pp. 58-61
    • Lee, Y.-C.1    Hsieh, Y.-C.2    You, P.-S.3    Chen, T.-C.4
  • 27
    • 70350696931 scopus 로고    scopus 로고
    • Vulnerability analysis of EMAP - An efficient RFID mutual authentication protocol
    • T. Li and R. H. Deng, Vulnerability Analysis of EMAP - An Efficient RFID Mutual Authentication Protocol, Proc. of the AReS'07 (2007).
    • (2007) Proc. of the AReS'07
    • Li, T.1    Deng, R.H.2
  • 28
    • 36248977046 scopus 로고    scopus 로고
    • Security analysis of two ultra-lightweight RFID authentication protocols
    • T. Li and G Wang, Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols, Proc. of the IFIP Information Security (2007).
    • (2007) Proc. of the IFIP Information Security
    • Li, T.1    Wang, G.2
  • 29
    • 38049077489 scopus 로고    scopus 로고
    • Novel RFID authentication schemes for security enhancement and system efficiency
    • N. W. Lo and K.-H. Yeh, Novel RFID authentication Schemes for Security Enhancement and System Efficiency, Proc. of the SDM'07(2007), 203-212.
    • (2007) Proc. of the SDM'07 , pp. 203-212
    • Lo, N.W.1    Yeh, K.-H.2
  • 30
    • 38149000154 scopus 로고    scopus 로고
    • An efficient mutual authentication scheme for EPCglobal class-1 genera-tion-2 RFID system
    • N. W. Lo and K.-H. Yeh, An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Genera-tion-2 RFID System, Proc. of the TRUST'07(2007), 43-56.
    • (2007) Proc. of the TRUST'07 , pp. 43-56
    • Lo, N.W.1    Yeh, K.-H.2
  • 31
    • 34247523203 scopus 로고    scopus 로고
    • HB-MP: A further step in the HB-family of lightweight authentication protocols
    • J. Munilla and A. Peinado, HB-MP: A Further Step in the HB-Family of Lightweight Authentication Protocols, Computer Networks (2007).
    • (2007) Computer Networks
    • Munilla, J.1    Peinado, A.2
  • 33
  • 34
    • 34247264350 scopus 로고    scopus 로고
    • RFID authentication protocol using ID synchronization in insure communication
    • J.-S. Park and I.-Y. Lee, RFID Authentication Protocol Using ID Synchronization in Insure Communication, Proc. of the ICHIT'06(2006), 664-667.
    • (2006) Proc. of the ICHIT'06 , pp. 664-667
    • Park, J.-S.1    Lee, I.-Y.2
  • 40
    • 70450265312 scopus 로고    scopus 로고
    • Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI
    • C.-W. Phan, Cryptanalysis of a New Ultralightweight RFID Authentication Protocol - SASI, IEEE Transactions on Dependable and Secure Computing 6(2009), 316-320.
    • (2009) IEEE Transactions on Dependable and Secure Computing , vol.6 , pp. 316-320
    • Phan, C.-W.1
  • 41
    • 36249031858 scopus 로고    scopus 로고
    • HB and related lightweight authentication protocols for secure RFID tag/reader authentication
    • S. Piramuthu, HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication, Proc. of the CollECTeR Europe Conference (2006).
    • (2006) Proc. of the CollECTeR Europe Conference
    • Piramuthu, S.1
  • 44
    • 67649545291 scopus 로고    scopus 로고
    • On the security of chien's ultralightweight RFID authentication protocol
    • H.-M. Sun, W.-C. Ting and K.-H. Wang, On the Security of Chien's ultralightweight RFID Authentication Protocol, Cryptology ePrint Archive (2008).
    • (2008) Cryptology EPrint Archive
    • Sun, H.-M.1    Ting, W.-C.2    Wang, K.-H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.