메뉴 건너뛰기




Volumn 10, Issue 5, 2012, Pages 508-520

An improved authentication protocol for mobile agent device in RFID environment

Author keywords

Authentication; Mobile agent; Mobile communication; RFID; Security

Indexed keywords

AUTHENTICATION PROTOCOLS; ENCRYPTED COMMUNICATION; FORGERY DETECTIONS; MOBILE COMMUNICATIONS; PRIVACY PROTECTION; RFID SECURITY; RFID SYSTEMS; SECURITY; SECURITY PROBLEMS;

EID: 84866074525     PISSN: 1470949X     EISSN: 17415217     Source Type: Journal    
DOI: 10.1504/IJMC.2012.048884     Document Type: Article
Times cited : (10)

References (21)
  • 1
    • 77949553535 scopus 로고    scopus 로고
    • Cryptanalysis of two RFID authentication protocols
    • Cao, T. and Shen, P. (2009) 'Cryptanalysis of two RFID authentication protocols', International Journal of Network Security, Vol. 9, No. 1, pp.95-100.
    • (2009) International Journal of Network Security , vol.9 , Issue.1 , pp. 95-100
    • Cao, T.1    Shen, P.2
  • 2
    • 34250667545 scopus 로고    scopus 로고
    • Architecture design and performance evaluation of RFID object tracking systems
    • Chen, J-L., Chen, M-C., Chen, C-W. and Chang, Y-C. (2007) 'Architecture design and performance evaluation of RFID object tracking systems', Computer Communications, Vol. 30, No. 9, pp.2070-2086.
    • (2007) Computer Communications , vol.30 , Issue.9 , pp. 2070-2086
    • Chen, J.-L.1    Chen, M.-C.2    Chen, C.-W.3    Chang, Y.-C.4
  • 3
    • 37849043107 scopus 로고    scopus 로고
    • Rfid in retail: A framework for examining consumers' ethical perceptions
    • Chen, J.C. and Pfleuger Jr., P. (2008) 'Rfid in retail: a framework for examining consumers' ethical perceptions', International Journal of Mobile Communications, Vol. 6, No. 1, pp.53-66.
    • (2008) International Journal of Mobile Communications , vol.6 , Issue.1 , pp. 53-66
    • Chen, J.C.1    Pfleuger Jr., P.2
  • 4
    • 38149009007 scopus 로고    scopus 로고
    • The state of rfid for effective baggage tracking in the airline industry
    • DeVries, P.D. (2008) 'The state of rfid for effective baggage tracking in the airline industry', International Journal of Mobile Communications, Vol. 6, No. 2, pp.151-164.
    • (2008) International Journal of Mobile Communications , vol.6 , Issue.2 , pp. 151-164
    • DeVries, P.D.1
  • 5
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • Garfinkel, S.L., Juels, A. and Pappu, R. (2005) 'RFID privacy: an overview of problems and proposed solutions', IEEE Security & Privacy, Vol. 3, No. 3, pp.34-43.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 6
    • 77952154117 scopus 로고    scopus 로고
    • Understanding the key success factors of rfid use in supply chain management: A delphi study
    • Hung, S-Y., Chang, S-I. and Ting, C-P. (2010) 'Understanding the key success factors of rfid use in supply chain management: a delphi study', International Journal of Mobile Communications, Vol. 8, No. 3, pp.313-333.
    • (2010) International Journal of Mobile Communications , vol.8 , Issue.3 , pp. 313-333
    • Hung, S.-Y.1    Chang, S.-I.2    Ting, C.-P.3
  • 7
    • 79953096361 scopus 로고    scopus 로고
    • Privacy and security requirements for RFID applications
    • Hwang, M-S. Wei, C-H. and Lee, C-Y. (2009) 'Privacy and security requirements for RFID applications', Journal of Computers, Vol. 20, No. 3.
    • (2009) Journal of Computers , vol.20 , Issue.3
    • Hwang, M.-S.1    Wei, C.-H.2    Lee, C.-Y.3
  • 8
    • 64149092115 scopus 로고    scopus 로고
    • Robust and efficient authenticated key agreement in mobile communications
    • Juang, W-S. and Wu, J-L. (2009) 'Robust and efficient authenticated key agreement in mobile communications', International Journal of Mobile Communications, Vol. 7, No. 5, pp.562-579.
    • (2009) International Journal of Mobile Communications , vol.7 , Issue.5 , pp. 562-579
    • Juang, W.-S.1    Wu, J.-L.2
  • 9
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • Juels, A. (2006) 'RFID security and privacy: a research survey', IEEE Journal on Selected Areas in Communication, Vol. 24, No. 2, pp.381-394.
    • (2006) IEEE Journal on Selected Areas in Communication , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 12
    • 76449091075 scopus 로고    scopus 로고
    • Enhanced monitoring of tuberculosis patients by using RFID technologies
    • Lai, C-L. Fang, K. and Chien, S-W. (2010) 'Enhanced monitoring of tuberculosis patients by using RFID technologies', International Journal of Mobile Communications, Vol. 8, No. 2, pp.244-256.
    • (2010) International Journal of Mobile Communications , vol.8 , Issue.2 , pp. 244-256
    • Lai, C.-L.1    Fang, K.2    Chien, S.-W.3
  • 14
    • 65649112157 scopus 로고    scopus 로고
    • Security analysis of the song-mitchell authentication protocol for low-cost RFID tags
    • Rizomiliotis, P., Rekleitis, E. and Gritzalis, S. (2009) 'Security analysis of the song-Mitchell authentication protocol for low-cost RFID tags', IEEE Communications Letters, Vol. 13, No. 4, pp.274-276.
    • (2009) IEEE Communications Letters , vol.13 , Issue.4 , pp. 274-276
    • Rizomiliotis, P.1    Rekleitis, E.2    Gritzalis, S.3
  • 15
    • 32444435813 scopus 로고    scopus 로고
    • Radio frequency identification (RFID)
    • Roberts, C.M. (2006) 'Radio frequency identification (RFID)', Computers & Security, Vol. 25, No. 1, pp.18-26.
    • (2006) Computers & Security , vol.25 , Issue.1 , pp. 18-26
    • Roberts, C.M.1
  • 16
    • 42549157259 scopus 로고    scopus 로고
    • A framework for assessing RFID system security and privacy risks
    • Rotter, P. (2008) 'A framework for assessing RFID system security and privacy risks', IEEE Pervasive Computing, Vol. 7, No. 2, pp.70-77.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.2 , pp. 70-77
    • Rotter, P.1
  • 17
  • 18
    • 85008055668 scopus 로고    scopus 로고
    • Secure and serverless RFID authentication and search protocols
    • Tan, C.C., Sheng, B. and Li, Q. (2008) 'Secure and serverless RFID authentication and search protocols', IEEE Transactions on Wireless Communications, Vol. 7, No. 4, pp.1400-1407.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1400-1407
    • Tan, C.C.1    Sheng, B.2    Li, Q.3
  • 20
    • 70349582554 scopus 로고    scopus 로고
    • Protecting your privacy with a mobile agent device in RFID environment
    • Yeo, S-S., Kim, S-C. and Kim, S.K. (2009) 'Protecting your privacy with a mobile agent device in RFID environment', Wireless Personal Communications, Vol. 51, No. 1, pp.165-178.
    • (2009) Wireless Personal Communications , vol.51 , Issue.1 , pp. 165-178
    • Yeo, S.-S.1    Kim, S.-C.2    Kim, S.K.3
  • 21
    • 77958017166 scopus 로고    scopus 로고
    • Security requirements for RFID computing systems
    • Zhang, X. and King, B. (2008) 'Security requirements for RFID computing systems', International Journal of Network Security, Vol. 6, No. 2, pp.214-226.
    • (2008) International Journal of Network Security , vol.6 , Issue.2 , pp. 214-226
    • Zhang, X.1    King, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.