메뉴 건너뛰기




Volumn 11, Issue 1, 2013, Pages 383-396

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems

Author keywords

Authentication; Privacy; RFID systems; Security protocols

Indexed keywords

AUTHENTICATION SCHEME; BACK-END SERVERS; CYCLIC REDUNDANCY CHECK; FORWARD SECRECY; MOBILE RFID; PASSIVE RFID; PSEUDO RANDOM NUMBER GENERATORS; QUADRATIC RESIDUES; RFID SYSTEMS; SECURE CHANNELS; SECURITY ANALYSIS; SECURITY OPERATIONS; SECURITY PROPERTIES; SECURITY PROTOCOLS; SHOW THROUGH; STRAND SPACE; UNTRACEABILITY;

EID: 84870065586     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2012.06.015     Document Type: Article
Times cited : (69)

References (44)
  • 2
    • 24644498485 scopus 로고    scopus 로고
    • RFID: A technical overview and its application to the enterprise
    • R. Weinstein RFID: a technical overview and its application to the enterprise IT Professionals 7 2005 27 33
    • (2005) IT Professionals , vol.7 , pp. 27-33
    • Weinstein, R.1
  • 3
    • 34547367358 scopus 로고    scopus 로고
    • The pros and cons of RFID in supply chain management
    • K. Michael, L. McCathie, The pros and cons of RFID in supply chain management, in: ICMB'05, 2005.
    • (2005) ICMB'05
    • Michael, K.1    McCathie, L.2
  • 5
    • 84865767888 scopus 로고    scopus 로고
    • RFID market projections 2008-2018
    • R. Das, RFID market projections 2008-2018, in: IDTechEx, 2008.
    • (2008) IDTechEx
    • Das, R.1
  • 7
    • 33645857377 scopus 로고    scopus 로고
    • Cryptography and authentication on RFID tags for apparels
    • K. Wong, P. Hui, and A. Chan Cryptography and authentication on RFID tags for apparels Computer in Industry 57 2005 342 349
    • (2005) Computer in Industry , vol.57 , pp. 342-349
    • Wong, K.1    Hui, P.2    Chan, A.3
  • 8
    • 84870055177 scopus 로고    scopus 로고
    • Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.2.0
    • EPCGlobal
    • EPCGlobal, Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.2.0, in: EPC Radio-Frequency Identity Protocols, 2008.
    • (2008) EPC Radio-Frequency Identity Protocols
  • 9
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • A. Juels, and S. Weiss Authenticating pervasive devices with human protocols Lecture Notes in Computer Science 3621 2005 293 308
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 293-308
    • Juels, A.1    Weiss, S.2
  • 10
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • Y. Chen, J.-S. Chou, and H.-M. Sun A novel mutual authentication scheme based on quadratic residues for RFID systems Computer Networks 52 2008 2373 2380
    • (2008) Computer Networks , vol.52 , pp. 2373-2380
    • Chen, Y.1    Chou, J.-S.2    Sun, H.-M.3
  • 11
    • 78751649779 scopus 로고    scopus 로고
    • Improvement of the RFID authentication scheme based on quadratic residues
    • T.-C. Yeh, C.-H. Wu, and Y.-M. Tseng Improvement of the RFID authentication scheme based on quadratic residues Computer Communications 34 2011 337 341 http://dx.doi.org/10.1016/j.comcom.2010.05.011
    • (2011) Computer Communications , Issue.34 , pp. 337-341
    • Yeh, T.-C.1    Wu, C.-H.2    Tseng, Y.-M.3
  • 14
    • 55749098453 scopus 로고    scopus 로고
    • New mutual agreement protocol to secure mobile RFID-enabled devices
    • N. Lo, K.-H. Yeh, C.Y. Yeun, New mutual agreement protocol to secure mobile RFID-enabled devices, Information Security Technical Report 13 (2008) 151-157.
    • (2008) Information Security Technical Report , vol.13 , pp. 151-157
    • Lo, N.1    Yeh, K.-H.2    Yeun, C.Y.3
  • 15
    • 24944575863 scopus 로고    scopus 로고
    • A cryptographic approach to a 'privacy-friendly' tags
    • Massachusetts Institute of Technology
    • M. Ohkubo, K. Suzuki, S. Kinoshita, A cryptographic approach to a 'privacy-friendly' tags, in: RFID Privacy Workshop, Massachusetts Institute of Technology, 2003.
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 18
    • 68849120029 scopus 로고    scopus 로고
    • ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    • H.-Y. Chien, and C.-S. Laih ECC-based lightweight authentication protocol with untraceability for low-cost RFID Journal of Parallel and Distributed Computing 69 2009 848 853
    • (2009) Journal of Parallel and Distributed Computing , vol.69 , pp. 848-853
    • Chien, H.-Y.1    Laih, C.-S.2
  • 20
    • 78751648506 scopus 로고    scopus 로고
    • Defending RFID authentication protocols against DoS attacks
    • D. Duc, K. Kim, Defending RFID authentication protocols against DoS attacks, Computer Communications. http://dx.doi.org/10.1016/j.comcom.2010.06. 014.
    • Computer Communications
    • Duc, D.1    Kim, K.2
  • 22
    • 79952451735 scopus 로고    scopus 로고
    • An optimal probabilistic solution for information confinement, privacy and security in RFID systems
    • R.D. Pietro, R. Molva, An optimal probabilistic solution for information confinement, privacy and security in RFID systems, Journal of Network and Computer Applications. http://dx.doi.org/10.1016/j.jnca.2010.04.015.
    • Journal of Network and Computer Applications
    • Pietro, R.D.1    Molva, R.2
  • 24
    • 68949181328 scopus 로고    scopus 로고
    • Anti-cloning protocol suitable for EPCglobal Class-1 Generation-2 RFID systems
    • E. Choi, D.H. Lee, and J.I. Lim Anti-cloning protocol suitable for EPCglobal Class-1 Generation-2 RFID systems Computer Standards and Interfaces 31 2009 1124 1130
    • (2009) Computer Standards and Interfaces , vol.31 , pp. 1124-1130
    • Choi, E.1    Lee, D.H.2    Lim, J.I.3
  • 25
    • 57049150751 scopus 로고    scopus 로고
    • A study on secure RFID authentication scheme in pervasive computing environment
    • S.-Y. Kang, D.-G. Lee, and I.-Y. Lee A study on secure RFID authentication scheme in pervasive computing environment Computer Communications 31 2008 4248 4254
    • (2008) Computer Communications , vol.31 , pp. 4248-4254
    • Kang, S.-Y.1    Lee, D.-G.2    Lee, I.-Y.3
  • 26
  • 29
    • 33947538532 scopus 로고    scopus 로고
    • Protocols for RFID tag/reader authentication
    • S. Piramuthu Protocols for RFID tag/reader authentication Decision Support Systems 43 2007 897 914
    • (2007) Decision Support Systems , vol.43 , pp. 897-914
    • Piramuthu, S.1
  • 33
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash based RFID mutual authenication protocol using a secret value
    • J.-S. Cho, S.-S. Yeo, S.-K. Kim, Securing against brute-force attack: a hash based RFID mutual authenication protocol using a secret value, Computer Communications. http://dx.doi.org/10.1016/j.comcom.2010.02.029.
    • Computer Communications
    • Cho, J.-S.1    Yeo, S.-S.2    Kim, S.-K.3
  • 35
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of EPC Class-1 Generation 2 standards RFID system with mutual authentication and privacy protection
    • C.-L. Chen, and Y.-Y. Deng Conformation of EPC Class-1 Generation 2 standards RFID system with mutual authentication and privacy protection Engineering Applications of Artificial Intelligence 22 2009 1284 1291
    • (2009) Engineering Applications of Artificial Intelligence , vol.22 , pp. 1284-1291
    • Chen, C.-L.1    Deng, Y.-Y.2
  • 36
    • 80052262009 scopus 로고    scopus 로고
    • Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol
    • G. Kapoor, and S. Piramuthu Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol Engineering Applications of Artificial Intelligence 24 7 2011 1300 1302 < 10.1016/j.engappai.2011.06. 011 >
    • (2011) Engineering Applications of Artificial Intelligence , vol.24 , Issue.7 , pp. 1300-1302
    • Kapoor, G.1    Piramuthu, S.2
  • 37
    • 67349277179 scopus 로고    scopus 로고
    • PAP: Privacy and authentication protocol for passive RFID tags
    • A. Liu, and L. Bailey PAP: privacy and authentication protocol for passive RFID tags Computer Communications 32 2009 1194 1199
    • (2009) Computer Communications , vol.32 , pp. 1194-1199
    • Liu, A.1    Bailey, L.2
  • 39
    • 77949562527 scopus 로고    scopus 로고
    • Cryptanalysis of some RFID authentication protocols
    • T. Cao, and P. Shen Cryptanalysis of some RFID authentication protocols Journal of Communications 3 7 2008 20 27
    • (2008) Journal of Communications , vol.3 , Issue.7 , pp. 20-27
    • Cao, T.1    Shen, P.2
  • 43
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • F. Thayer, J. Herzog, and J. Guttman Strand spaces: proving security protocols correct Journal of Computer Security 7 2/3 1999 191 230
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 191-230
    • Thayer, F.1    Herzog, J.2    Guttman, J.3
  • 44
    • 84957663269 scopus 로고    scopus 로고
    • Software Performance of Universal Hash Functions
    • (LNCS1592) (1999)
    • W. Nevelsteen, B. Preneel, Software Performance of Universal Hash Functions, Advances in Cryptology EUROCRYPT 1999 (LNCS1592) (1999) 24-41.
    • (1999) Advances in Cryptology EUROCRYPT , pp. 24-41
    • Nevelsteen, W.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.