메뉴 건너뛰기




Volumn 56, Issue 15, 2012, Pages 3401-3416

A minimum disclosure approach to authentication and privacy in RFID systems

Author keywords

Authentication; Privacy; RFID systems; Security protocols

Indexed keywords

AUTHENTICATION DELAYS; AUTHENTICATION SCHEME; COMPUTATIONAL CONSTRAINTS; CYCLIC REDUNDANCY CHECK; MUTUAL AUTHENTICATION; PASSIVE RFID; PSEUDO RANDOM NUMBER GENERATORS; RFID SYSTEMS; ROBUST SECURITY; SECURITY ANALYSIS; SECURITY PROTOCOLS; SECURITY SCHEME; SECURITY VULNERABILITIES; UNTRACEABILITY;

EID: 84865741288     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2012.06.018     Document Type: Article
Times cited : (34)

References (42)
  • 2
    • 24644498485 scopus 로고    scopus 로고
    • RFID: A technical overview and its application to the enterprise
    • R. Weinstein RFID: a technical overview and its application to the enterprise IT Professionals 7 2005 27 33
    • (2005) IT Professionals , vol.7 , pp. 27-33
    • Weinstein, R.1
  • 3
    • 34547367358 scopus 로고    scopus 로고
    • The pros and cons of RFID in supply chain management
    • K. Michael, L. McCathie, The pros and cons of RFID in supply chain management, in: ICMB'05, 2005.
    • (2005) ICMB'05
    • Michael, K.1    McCathie, L.2
  • 5
    • 84865767888 scopus 로고    scopus 로고
    • RFID Market Projections 2008-2018
    • R. Das, RFID Market Projections 2008-2018, in: IDTechEx, 2008.
    • (2008) IDTechEx
    • Das, R.1
  • 6
    • 84865767892 scopus 로고    scopus 로고
    • EPCGlobal, Class-1 Generation-2 UHF RFID protocol for communications at 860-960 MHz Version 1.2.0
    • EPCGlobal, Class-1 Generation-2 UHF RFID protocol for communications at 860-960 MHz Version 1.2.0, in: EPC Radio-Frequency Identity Protocols, 2008.
    • (2008) EPC Radio-Frequency Identity Protocols
  • 7
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • A. Juels, and S. Weiss Authenticating pervasive devices with human protocols Lecture Notes in Computer Science 3621 2005 293 308
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 293-308
    • Juels, A.1    Weiss, S.2
  • 10
    • 55749098453 scopus 로고    scopus 로고
    • New mutual agreement protocol to secure mobile RFID-enabled devices
    • N. Lo, K.-H. Yeh, and C.Y. Yeun New mutual agreement protocol to secure mobile RFID-enabled devices Information Security Technical Report 13 2008 151 157
    • (2008) Information Security Technical Report , vol.13 , pp. 151-157
    • Lo, N.1    Yeh, K.-H.2    Yeun, C.Y.3
  • 11
    • 24944575863 scopus 로고    scopus 로고
    • A cryptographic approach to a 'privacy-friendly' tags
    • Masachusetts Institute of Technology
    • M. Ohkubo, K. Suzuki, and S. Kinoshita A cryptographic approach to a 'privacy-friendly' tags RFID Privacy Workshop 2003 Masachusetts Institute of Technology
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 14
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • Y. Chen, J.-S. Chou, and H.-M. Sun A novel mutual authentication scheme based on quadratic residues for RFID systems Computer Networks 52 2008 2373 2380
    • (2008) Computer Networks , vol.52 , pp. 2373-2380
    • Chen, Y.1    Chou, J.-S.2    Sun, H.-M.3
  • 15
    • 68849120029 scopus 로고    scopus 로고
    • ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    • H.-Y. Chien, and C.-S. Laih ECC-based lightweight authentication protocol with untraceability for low-cost RFID Journal of Parallel and Distributed Computing 69 2009 848 853
    • (2009) Journal of Parallel and Distributed Computing , vol.69 , pp. 848-853
    • Chien, H.-Y.1    Laih, C.-S.2
  • 16
    • 78751649779 scopus 로고    scopus 로고
    • Improvement of the RFID authentication scheme based on quadratic residues
    • 10.1016/j.comcom.2010.05.011 u
    • T.-C. Yeh, C.-H. Wu, and Y.-M. Tseng Improvement of the RFID authentication scheme based on quadratic residues Computer Communications 34 2011 337 341. u 10.1016/j.comcom.2010.05.011
    • (2011) Computer Communications , Issue.34 , pp. 337-341
    • Yeh, T.-C.1    Wu, C.-H.2    Tseng, Y.-M.3
  • 18
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • H.-Y. Chien, and C.-H. Chen Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards Computer Standards and Interfaces 29 2007 254 259
    • (2007) Computer Standards and Interfaces , vol.29 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 19
    • 50249161524 scopus 로고    scopus 로고
    • SQUASH a new MAC with provable security properties for highly constrained devices such as RFID tags
    • A. Shamir SQUASH a new MAC with provable security properties for highly constrained devices such as RFID tags Lecture Notes in Computer Science 5086 2008 144 157
    • (2008) Lecture Notes in Computer Science , vol.5086 , pp. 144-157
    • Shamir, A.1
  • 22
    • 79952451735 scopus 로고    scopus 로고
    • An optimal probabilistic solution for information confinement, privacy and security in RFID systems
    • R.D. Pietro, R. Molva, An optimal probabilistic solution for information confinement, privacy and security in RFID systems, Journal of Network and Computer Applications. http://dx.doi.org/10.1016/j.jnca.2010.04.015.
    • Journal of Network and Computer Applications
    • Pietro, R.D.1    Molva, R.2
  • 23
    • 68949181328 scopus 로고    scopus 로고
    • Anti-cloning protocol suitable for EPCglobal Class-1 Generation-2 RFID systems
    • E. Choi, D.H. Lee, and J.I. Lim Anti-cloning protocol suitable for EPCglobal Class-1 Generation-2 RFID systems Computer Standards and Interfaces 31 2009 1124 1130
    • (2009) Computer Standards and Interfaces , vol.31 , pp. 1124-1130
    • Choi, E.1    Lee, D.H.2    Lim, J.I.3
  • 24
    • 78751648506 scopus 로고    scopus 로고
    • Defending RFID authentication protocols against DoS attacks
    • D. Duc, K. Kim, Defending RFID authentication protocols against DoS attacks, Computer Communications. http://dx.doi.org/10.1016/j.comcom.2010.06. 014.
    • Computer Communications
    • Duc, D.1    Kim, K.2
  • 26
    • 57049150751 scopus 로고    scopus 로고
    • A study on secure RFID authentication scheme in pervasive computing environment
    • S.-Y. Kang, D.-G. Lee, and I.-Y. Lee A study on secure RFID authentication scheme in pervasive computing environment Computer Communications 31 2008 4248 4254
    • (2008) Computer Communications , vol.31 , pp. 4248-4254
    • Kang, S.-Y.1    Lee, D.-G.2    Lee, I.-Y.3
  • 27
  • 30
    • 33947538532 scopus 로고    scopus 로고
    • Protocols for RFID tag/reader authentication
    • S. Piramuthu Protocols for RFID tag/reader authentication Decision Support Systems 43 2007 897 914
    • (2007) Decision Support Systems , vol.43 , pp. 897-914
    • Piramuthu, S.1
  • 31
    • 67349277179 scopus 로고    scopus 로고
    • PAP: Privacy and authentication protocol for passive RFID tags
    • A. Liu, and L. Bailey PAP: privacy and authentication protocol for passive RFID tags Computer Communications 32 2009 1194 1199
    • (2009) Computer Communications , vol.32 , pp. 1194-1199
    • Liu, A.1    Bailey, L.2
  • 32
    • 77949562527 scopus 로고    scopus 로고
    • Cryptanalysis of some RFID authentication protocols
    • T. Cao, and P. Shen Cryptanalysis of some RFID authentication protocols Journal of Communications 3 7 2008 20 27
    • (2008) Journal of Communications , vol.3 , Issue.7 , pp. 20-27
    • Cao, T.1    Shen, P.2
  • 33
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of EPC Class-1 Generation 2 standards RFID system with mutual authentication and privacy protection
    • C.-L. Chen, and Y.-Y. Deng Conformation of EPC Class-1 Generation 2 standards RFID system with mutual authentication and privacy protection Engineering Applications of Artificial Intelligence 22 2009 1284 1291
    • (2009) Engineering Applications of Artificial Intelligence , vol.22 , pp. 1284-1291
    • Chen, C.-L.1    Deng, Y.-Y.2
  • 40
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • F. Thayer, J. Herzog, and J. Guttman Strand spaces: proving security protocols correct Journal of Computer Security 7 2/3 1999 191 230
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 191-230
    • Thayer, F.1    Herzog, J.2    Guttman, J.3
  • 41
    • 84872734396 scopus 로고    scopus 로고
    • Airbus signs contract for high-memory rfid tags
    • January
    • R. Wessel, Airbus signs contract for high-memory rfid tags, RFID Journal, January 2010. http://www.rfidjournal.com/article/view/7323.
    • (2010) RFID Journal
    • Wessel, R.1
  • 42
    • 84865710579 scopus 로고    scopus 로고
    • Large memory RFID system solutions
    • dyn/resources/Prod documents/secrerf-largemem-3-04.pd
    • D. Dressen Large memory RFID system solutions ATMEL Applications Journal 2011 48 49 http://www.atmel.com/ dyn/resources/Prod documents/secrerf-largemem- 3-04.pd
    • (2011) ATMEL Applications Journal , pp. 48-49
    • Dressen, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.