메뉴 건너뛰기




Volumn 9, Issue 1, 2013, Pages 16-27

Distance bounding: A practical security solution for real-time location systems

Author keywords

Distance bounding; proximity authentication; real time location; RFID; secure neighbor detection (SND); secure ranging; wireless

Indexed keywords

CHALLENGE-RESPONSE PAIR; DETECTION METHODS; DISTANCE-BOUNDING; PERFORMANCE TRADE-OFF; PHYSICAL PROXIMITY; PRACTICAL IMPLEMENTATION; REAL-TIME COMMUNICATION; REAL-TIME LOCATION; RESEARCH CHALLENGES; RESOURCE REQUIREMENTS; ROUND-TRIP TIME; SECURE NEIGHBOR DETECTION (SND); SECURITY SERVICES; SECURITY SOLUTIONS; UPPER BOUND; WIRELESS ENVIRONMENT;

EID: 84871797848     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2012.2218252     Document Type: Article
Times cited : (56)

References (71)
  • 2
    • 79954495561 scopus 로고    scopus 로고
    • A standalone RFID indoor positioning system using passive tags
    • Jul.
    • S. S. Saad and Z. S. Nakadv, "A standalone RFID indoor positioning system using passive tags, " IEEE Trans. Ind. Electron., vol. 58, no. 5, pp. 1961-1970, Jul. 2010.
    • (2010) IEEE Trans. Ind. Electron , vol.58 , Issue.5 , pp. 1961-1970
    • Saad, S.S.1    Nakadv, Z.S.2
  • 3
    • 79955804626 scopus 로고    scopus 로고
    • Item-level RFID in a retail supply chain with stock-out-based substitution
    • May.
    • G. M. Gaukler, "Item-level RFID in a retail supply chain with stock-out-based substitution, " IEEE Trans. Ind. Inf., vol. 7, no. 2, pp. 362-370, May. 2011.
    • (2011) IEEE Trans. Ind. Inf , vol.7 , Issue.2 , pp. 362-370
    • Gaukler, G.M.1
  • 4
    • 52949100457 scopus 로고    scopus 로고
    • An efficient localization scheme for a differential-driving mobile robot based on RFID system
    • Nov
    • S. Han, H.-S. Lim, and J.-M. Lee, "An efficient localization scheme for a differential-driving mobile robot based on RFID system, " IEEE Trans. Ind. Electron., vol. 54, no. 6, pp. 3362-3369, Nov. 2007.
    • (2007) IEEE Trans. Ind. Electron , vol.54 , Issue.6 , pp. 3362-3369
    • Han, S.1    Lim, H.-S.2    Lee, J.-M.3
  • 5
    • 59049098426 scopus 로고    scopus 로고
    • Credential management for automatic identification solutions in supply chain management
    • Nov
    • M. Henseler, M. Rossberg, and G. Schaefer, "Credential management for automatic identification solutions in supply chain management, " IEEE Trans. Ind. Inf., vol. 4, no. 4, pp. 303-314, Nov. 2008.
    • (2008) IEEE Trans. Ind. Inf , vol.4 , Issue.4 , pp. 303-314
    • Henseler, M.1    Rossberg, M.2    Schaefer, G.3
  • 7
    • 67651177970 scopus 로고    scopus 로고
    • Autonomousmobile robot navigation using passive RFID in indoor environment
    • S. Park and S. Hashimoto, "Autonomousmobile robot navigation using passive RFID in indoor environment, " IEEE Trans. Ind. Electron., vol. 56, no. 7, pp. 2366-2373, 2009.
    • (2009) IEEE Trans. Ind. Electron , vol.56 , Issue.7 , pp. 2366-2373
    • Park, S.1    Hashimoto, S.2
  • 8
    • 70349451691 scopus 로고    scopus 로고
    • Confidence in smart token proximity: Relay attacks revisited
    • G. P. Hancke, K. E. Mayes, and K. Markantonakis, "Confidence in smart token proximity: Relay attacks revisited, "Comput. Security, vol. 28, pp. 615-627, 2009.
    • (2009) Comput. Security , vol.28 , pp. 615-627
    • Hancke, G.P.1    Mayes, K.E.2    Markantonakis, K.3
  • 9
    • 77951198358 scopus 로고    scopus 로고
    • A node-to-node location verification method
    • May
    • D. Lui, M.-C. Lee, and D. Wu, "A node-to-node location verification method, " IEEE Trans. Ind. Electron., vol. 57, no. 5, pp. 1526-1537, May 2010.
    • (2010) IEEE Trans. Ind. Electron , vol.57 , Issue.5 , pp. 1526-1537
    • Lui, D.1    Lee, M.-C.2    Wu, D.3
  • 10
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • T. Helleseth, Ed. Berlin, Germany: Springer
    • S. Brands and D. Chaum, "Distance-bounding protocols, " in Advances in Cryptology-EUROCRYPT '93, T. Helleseth, Ed. Berlin, Germany: Springer, 1994, pp. 344-359.
    • (1994) Advances in Cryptology-EUROCRYPT '93 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 12
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    • J. Munilla and A. Peinado, "Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels, " WirelessCommun. MobileComputing, vol. 8, pp. 1227-1232, 2008.
    • (2008) WirelessCommun. MobileComputing , vol.8 , pp. 1227-1232
    • Munilla, J.1    Peinado, A.2
  • 13
    • 36249008630 scopus 로고    scopus 로고
    • Distance-bounding based defense against relay attacks in wireless networks
    • DOI 10.1109/TWC.2007.060183
    • C. Tang, D. O. Wu, T. Syst, and L. Oswego, "Distance-bounding based defense against relay attacks in wireless networks, " IEEE Trans. WirelessCommun., vol. 6, no. 11, pp. 4071-4078, Nov. 2007. (Pubitemid 350121756)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.11 , pp. 4071-4078
    • Tang, C.1    Wu, D.O.2
  • 14
    • 84977898401 scopus 로고    scopus 로고
    • Using directional antennas to prevent wormhole attacks
    • San Diego, CA
    • L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks, " in Proc. 11th Network Distrib. Syst. Security Symp., San Diego, CA, 2004, pp. 131-141.
    • (2004) Proc. 11th Network Distrib. Syst. Security Symp. , pp. 131-141
    • Hu, L.1    Evans, D.2
  • 15
    • 33144467507 scopus 로고    scopus 로고
    • Robust statistical methods for securing wireless localization in sensor networks
    • DOI 10.1109/IPSN.2005.1440903, 1440903, 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005
    • Z. Li, W. Trappe, Y. Zhang, and B. Nath, "Robust statistical methods for securing wireless localization in sensor networks, " in Proc. 4th IEEE In. Symp. Inf. Process. Sensor Networks, Los Angeles, CA, 2005, pp. 91-98. (Pubitemid 43841219)
    • (2005) 2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005 , vol.2005 , pp. 91-98
    • Li, Z.1    Trappe, W.2    Zhang, Y.3    Nath, B.4
  • 16
    • 34548321774 scopus 로고    scopus 로고
    • Detecting wormhole attacks in wireless networks using connectivity information
    • DOI 10.1109/INFCOM.2007.21, 4215603, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • R. Maheshwari, J. Gao, and S. R. Das, "Detecting wormhole attacks in wireless networks using connectivity information, " in Proc. 26th IEEE Int. Conf.Comput.Commun., Anchorage, AL, 2007, pp. 107-115. (Pubitemid 47334221)
    • (2007) Proceedings - IEEE INFOCOM , pp. 107-115
    • Maheshwari, R.1    Gao, J.2    Das, S.R.3
  • 19
    • 33144454801 scopus 로고    scopus 로고
    • Secure positioning inwireless networks
    • Feb
    • S. Capkun and J. P. Hubaux, "Secure positioning inwireless networks, " IEEE J. Sel. AreasCommun., vol. 24, no. 2, pp. 221-232, Feb. 2006.
    • (2006) IEEE J. Sel. AreasCommun , vol.24 , Issue.2 , pp. 221-232
    • Capkun, S.1    Hubaux, J.P.2
  • 20
    • 79952975500 scopus 로고    scopus 로고
    • A framework for analyzing RFID distance bounding protocols
    • Apr.
    • G. Avoine, M. A. Bingol, S. Kardas, C. Lauradoux, and B. Martin, "A framework for analyzing RFID distance bounding protocols, " J.Comput. Security, vol. 19, no. 2, pp. 289-317, Apr. 2011.
    • (2011) J. Comput. Security , vol.19 , Issue.2 , pp. 289-317
    • Avoine, G.1    Bingol, M.A.2    Kardas, S.3    Lauradoux, C.4    Martin, B.5
  • 21
    • 68349138859 scopus 로고    scopus 로고
    • Ph. D. dissertation,Comput. Lab., Univ. of Cambridge, Cambridge, U. K Feb [Online]
    • G. P. Hancke, "Security of proximity identification systems" Ph. D. dissertation,Comput. Lab., Univ. of Cambridge, Cambridge, U. K., Feb. 2008 [Online]. Available: http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-752.pdf
    • (2008) Security of Proximity Identification Systems
    • Hancke, G.P.1
  • 22
    • 85028745474 scopus 로고
    • Special uses and abuses of the fiat-shamir passport protocol
    • C. Pomerance, Ed. Berlin, Germany: Springer
    • Y. Desmedt, C. Goutier, and S. Bengio, "Special uses and abuses of the fiat-shamir passport protocol, " in Advances in Cryptology-CRYPTO '87, C. Pomerance, Ed. Berlin, Germany: Springer, 1988, pp. 21-39.
    • (1988) Advances in Cryptology-CRYPTO '87 , pp. 21-39
    • Desmedt, Y.1    Goutier, C.2    Bengio, S.3
  • 23
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • San Diego, CA
    • Y. C. Hu, A. Perrig, andD. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols, " in Pro. 2ndACMWorkshop Wireless Security, San Diego, CA, 2003, pp. 30-40.
    • (2003) Pro. 2nd ACM Workshop Wireless Security , pp. 30-40
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 24
    • 0345964587 scopus 로고
    • Major security problems with the "unforgeable" (feige)-Fiat-Shamir proofs of identity and how to overcome them
    • Y. Desmedt, "Major security problems with the " unforgeable" (feige)-Fiat-Shamir proofs of identity and how to overcome them, " in Proc. 6th Worldwide CongressComput.Commun. Security Protection, 1988, pp. 147-159.
    • (1988) Proc. 6th Worldwide CongressComput.Commun. Security Protection , pp. 147-159
    • Desmedt, Y.1
  • 25
    • 84885078444 scopus 로고    scopus 로고
    • Distance-bounding proof of knowledge to avoid real-time attacks
    • R. Sasaki, S. Qing, E. Okamoto, and H. Yoshiura, Eds. Berlin, Germany: Springer
    • L. Bussard and W. Bagga, "Distance-bounding proof of knowledge to avoid real-time attacks, " in Security and Privacy in the Age of UbiquitousComputing, R. Sasaki, S. Qing, E. Okamoto, and H. Yoshiura, Eds. Berlin, Germany: Springer, 2005, pp. 223-238.
    • (2005) Security and Privacy in the Age of UbiquitousComputing , pp. 223-238
    • Bussard, L.1    Bagga, W.2
  • 26
    • 0035424017 scopus 로고    scopus 로고
    • Location systems for ubiquitouscomputing
    • J. Hightower and G. Borriello, "Location systems for ubiquitouscomputing, " IEEE Computer, vol. 34, pp. 57-66, 2001.
    • (2001) IEEE Computer , vol.34 , pp. 57-66
    • Hightower, J.1    Borriello, G.2
  • 27
    • 84876367662 scopus 로고    scopus 로고
    • So near and yet so far: Distance-bounding attacks in wireless networks
    • L. Buttyan, V. Gligor, and D. Westhoff, Eds. Berlin, Germany: Springer
    • J. Clulow, G. P. Hancke, M. G. Kuhn, and T. Moore, "So near and yet so far: Distance-bounding attacks in wireless networks, " in Security and Privacy in Ad-Hoc and Sensor Networks, L. Buttyan, V. Gligor, and D. Westhoff, Eds. Berlin, Germany: Springer, 2006, pp. 83-97.
    • (2006) Security and Privacy in Ad-Hoc and Sensor Networks , pp. 83-97
    • Clulow, J.1    Hancke, G.P.2    Kuhn, M.G.3    Moore, T.4
  • 31
    • 71549138804 scopus 로고    scopus 로고
    • RFID distance bounding protocol with mixed challenges to prevent relay attacks
    • J. A. Garay, A. Miyaji, and A. Otsuka, Eds. Berlin, Germany: Springer
    • C. H. Kim and G. Avoine, "RFID distance bounding protocol with mixed challenges to prevent relay attacks, " in Cryptology and Network Security-CANS '09, J. A. Garay, A. Miyaji, and A. Otsuka, Eds. Berlin, Germany: Springer, 2009, pp. 119-133.
    • (2009) Cryptology and Network Security-CANS '09 , pp. 119-133
    • Kim, C.H.1    Avoine, G.2
  • 34
    • 77649240515 scopus 로고    scopus 로고
    • RFID distance bounding multistate enhancement
    • B. Roy and N. Sendrier, Eds. Berlin, Germany: Springer
    • G. Avoine, C. Floerkemeier, and B. Martin, "RFID distance bounding multistate enhancement, " in Progress in Cryptology-INDOCRYPT '09, B. Roy and N. Sendrier, Eds. Berlin, Germany: Springer, 2009, pp. 290-307.
    • (2009) Progress in Cryptology-INDOCRYPT '09 , pp. 290-307
    • Avoine, G.1    Floerkemeier, C.2    Martin, B.3
  • 35
    • 70350424442 scopus 로고    scopus 로고
    • An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
    • P. Samarati M. Yung, F. Martinelli, and C. A. Ardagna, Eds. Berlin, Germany: Springer
    • G. Avoine and A. Tchamkerten, "An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement, " in Information Security, P. Samarati, M. Yung, F. Martinelli, and C. A. Ardagna, Eds. Berlin, Germany: Springer, 2009, pp. 250-261.
    • (2009) Information Security , pp. 250-261
    • Avoine, G.1    Tchamkerten, A.2
  • 37
    • 77956599919 scopus 로고    scopus 로고
    • Security in building automation systems
    • Nov.
    • W. Granzer, F. Praus, andW. Kastner, "Security in building automation systems, " IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3622-3630, Nov. 2011.
    • (2011) IEEE Trans. Ind. Electron , vol.57 , Issue.11 , pp. 3622-3630
    • Granzer, W.1    Praus, F.2    Kastner, W.3
  • 38
    • 79951577827 scopus 로고    scopus 로고
    • Formal vulnerability analysis of a security system for remote fieldbus access
    • Feb.
    • M. Cheminod, A. Pironti, and R. Sisto, "Formal vulnerability analysis of a security system for remote fieldbus access, " IEEE Trans. Ind. Inf., vol. 7, no. 1, pp. 30-40, Feb. 2011.
    • (2011) IEEE Trans. Ind. Inf , vol.7 , Issue.1 , pp. 30-40
    • Cheminod, M.1    Pironti, A.2    Sisto, R.3
  • 39
    • 77955712393 scopus 로고    scopus 로고
    • On maximizing reliability of real-time embedded applications under hard energy constraint
    • Aug.
    • B. Zhao, H. Aydin, and D. Zhu, "On maximizing reliability of real-time embedded applications under hard energy constraint, " IEEE Trans. Ind. Inf., vol. 6, no. 3, pp. 316-328, Aug. 2010.
    • (2010) IEEE Trans. Ind. Inf , vol.6 , Issue.3 , pp. 316-328
    • Zhao, B.1    Aydin, H.2    Zhu, D.3
  • 40
    • 79956290240 scopus 로고    scopus 로고
    • A loss inference algorithm for wireless sensor networks to improve data reliability of digital ecosystems
    • Jun.
    • Y. Yang, Y. Xu, X. Li, and C. Chen, "A loss inference algorithm for wireless sensor networks to improve data reliability of digital ecosystems, " IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2126-2137, Jun. 2011.
    • (2011) IEEE Trans. Ind. Electron , vol.58 , Issue.6 , pp. 2126-2137
    • Yang, Y.1    Xu, Y.2    Li, X.3    Chen, C.4
  • 41
    • 78149469554 scopus 로고    scopus 로고
    • Parameter selection for real-time controllers in resource-constrained systems
    • Nov.
    • Y. Wu, G. Buttazzo, E. Bini, and A. Cervin, "Parameter selection for real-time controllers in resource-constrained systems, " IEEE Trans. Ind. Inf., vol. 6, no. 4, pp. 610-620, Nov. 2010.
    • (2010) IEEE Trans. Ind. Inf , vol.6 , Issue.4 , pp. 610-620
    • Wu, Y.1    Buttazzo, G.2    Bini, E.3    Cervin, A.4
  • 42
    • 77951156895 scopus 로고    scopus 로고
    • Hardware implementation of RFID mutual authentication protocol
    • May
    • Y.-J. Huang, C.-C. Yuan, M.-K. Chen, W.-C. Lin, and H.-C. Teng, "Hardware implementation of RFID mutual authentication protocol, " IEEE Trans. Ind. Electron., vol. 57, no. 5, pp. 1573-1582, May 2010.
    • (2010) IEEE Trans. Ind. Electron , vol.57 , Issue.5 , pp. 1573-1582
    • Huang, Y.-J.1    Yuan, C.-C.2    Chen, M.-K.3    Lin, W.-C.4    Teng, H.-C.5
  • 43
    • 77955709887 scopus 로고    scopus 로고
    • Comparative study of energy-efficient sampling approaches for wireless control networks
    • Aug.
    • J. Ploennigs, V. Vasyutynskyy, and K. Kabitzsch, "Comparative study of energy-efficient sampling approaches for wireless control networks, " IEEE Trans. Ind. Inf., vol. 6, no. 3, pp. 416-424, Aug. 2010.
    • (2010) IEEE Trans. Ind. Inf , vol.6 , Issue.3 , pp. 416-424
    • Ploennigs, J.1    Vasyutynskyy, V.2    Kabitzsch, K.3
  • 44
    • 80051780804 scopus 로고    scopus 로고
    • Energy-efficient coverage of wireless sensor networks using ant colony optimization with three types of pheromones
    • Aug.
    • J.-W. Lee, B.-S. Choi, and J.-J. Lee, "Energy-efficient coverage of wireless sensor networks using ant colony optimization with three types of pheromones, " IEEE Trans. Ind. Inf., vol. 7, no. 3, pp. 419-427, Aug. 2011.
    • (2011) IEEE Trans. Ind. Inf , vol.7 , Issue.3 , pp. 419-427
    • Lee, J.-W.1    Choi, B.-S.2    Lee, J.-J.3
  • 45
    • 81255144115 scopus 로고    scopus 로고
    • Performance of a real-time EtherCAT master under Linux
    • Nov.
    • M. Cereia, I. Cibrario-Bertolotti, and S. Scanzio, "Performance of a real-time EtherCAT master under Linux, " IEEE Trans. Ind. Inf., vol. 7, no. 4, pp. 679-687, Nov. 2011.
    • (2011) IEEE Trans. Ind. Inf , vol.7 , Issue.4 , pp. 679-687
    • Cereia, M.1    Cibrario-Bertolotti, I.2    Scanzio, S.3
  • 46
    • 77955667024 scopus 로고    scopus 로고
    • Energy-efficient task synchronization for real-time systems
    • Aug.
    • Y.-S. Chen, C.-Y. Yang, and T.-W. Kuo, "Energy-efficient task synchronization for real-time systems, " IEEE Trans. Ind. Inf., vol. 6, no. 3, pp. 287-301, Aug. 2010.
    • (2010) IEEE Trans. Ind. Inf , vol.6 , Issue.3 , pp. 287-301
    • Chen, Y.-S.1    Yang, C.-Y.2    Kuo, T.-W.3
  • 47
    • 84871821380 scopus 로고    scopus 로고
    • Recommendation for the transitioning of cryptographic algorithms and key sizes
    • [Online]
    • E. Barker and A. Roginsky, "Recommendation for the transitioning of cryptographic algorithms and key sizes, " CiteSeerx. USA, Jan. 2010. [Online]. Available: http://csrc. nist. gov/publications/drafts/800-131/draft- 800-131-transition-paper.pdf
    • (2010) CiteSeerx. USA, Jan
    • Barker, E.1    Roginsky, A.2
  • 48
    • 56749181480 scopus 로고    scopus 로고
    • Attacks on time-of-flight distance bounding channels
    • Alexandria, VA
    • G. P. Hancke and M. G. Kuhn, "Attacks on time-of-flight distance bounding channels, " in Proc. 1st ACM Conf. Wireless Network Security, Alexandria, VA, 2008, pp. 194-202.
    • (2008) Proc. 1st ACM Conf. Wireless Network Security , pp. 194-202
    • Hancke, G.P.1    Kuhn, M.G.2
  • 49
    • 38149028509 scopus 로고    scopus 로고
    • Distance bounding in noisy environments
    • F. Stajano C. Meadows, S. Capkun, and T. Moore, Eds. Berlin, Germany: Springer
    • D. Singelée and B. Preneel, "Distance bounding in noisy environments, " in Security and Privacy in Ad-Hoc and Sensor Networks, F. Stajano, C. Meadows, S. Capkun, and T. Moore, Eds. Berlin, Germany: Springer, 2007, pp. 101-115.
    • (2007) Security and Privacy in Ad-Hoc and Sensor Networks , pp. 101-115
    • Singelée, D.1    Preneel, B.2
  • 50
    • 76549120985 scopus 로고    scopus 로고
    • Attacks on a distance bounding protocol
    • J. Munilla and A. Peinado, "Attacks on a distance bounding protocol, "ComputerCommun., vol. 33, pp. 884-889, 2010.
    • (2010) ComputerCommun , vol.33 , pp. 884-889
    • Munilla, J.1    Peinado, A.2
  • 52
    • 77955855632 scopus 로고    scopus 로고
    • Designing a random number generator with novel parallel LFSR substructure for key stream ciphers
    • Jun
    • Z. Moghadam, I. Rostami, A. S. Tanhatalab, andM. R. Ferdowsi, "Designing a random number generator with novel parallel LFSR substructure for key stream ciphers, " in Proc. Int. Conf.Comput. Design Applic., Jun. 2010, pp. 598-601.
    • (2010) Proc. Int. Conf.Comput. Design Applic. , pp. 598-601
    • Moghadam, Z.1    Rostami, I.2    Tanhatalab, A.S.3    Ferdowsi, M.R.4
  • 53
    • 79952438809 scopus 로고    scopus 로고
    • Design of a secure distance-bounding channel for RFID
    • G. P. Hancke, "Design of a secure distance-bounding channel for RFID, " J. NetworkComput. Applic., vol. 34, pp. 877-887, 2011.
    • (2011) J. NetworkComput. Applic , vol.34 , pp. 877-887
    • Hancke, G.P.1
  • 54
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close: Distance bounding against Smartcard relay attacks
    • Boston, MA
    • S. Drimer and S. J. Murdoch, "Keep your enemies close: Distance bounding against Smartcard relay attacks, " in Proc. 16th USENIX Security Symp., Boston, MA, 2007, pp. 87-102.
    • (2007) Proc. 16th USENIX Security Symp , pp. 87-102
    • Drimer, S.1    Murdoch, S.J.2
  • 57
    • 79953104627 scopus 로고    scopus 로고
    • Real-time location systems for hospital emergency response
    • April
    • I. D'Souza, M. Wei, and C. Notobartolo, "Real-time location systems for hospital emergency response, " IEEE IT Professional, vol. 13, no. 2, pp. 37-43, April 2011.
    • (2011) IEEE IT Professional , vol.13 , Issue.2 , pp. 37-43
    • D'Souza, I.1    Wei, M.2    Notobartolo, C.3
  • 61
    • 78549255905 scopus 로고    scopus 로고
    • Application of RFID and RTLS technology in supply chain enterprise
    • Sep
    • Y. Zang and L. Wu, "Application of RFID and RTLS technology in supply chain enterprise, " in Proc. WirelessCommun. Networking MobileComputing, Sep. 2010, pp. 1-4.
    • (2010) Proc. WirelessCommun. Networking MobileComputing , pp. 1-4
    • Zang, Y.1    Wu, L.2
  • 66
    • 79952958289 scopus 로고    scopus 로고
    • Practical eavesdropping and skimming attacks on high-frequency RFID tokens
    • January
    • G. P. Hancke, "Practical eavesdropping and skimming attacks on high-frequency RFID tokens, " J.Comput. Security, vol. 19, no. 2, pp. 259-288, January 2011.
    • (2011) J.Comput. Security , vol.19 , Issue.2 , pp. 259-288
    • Hancke, G.P.1
  • 67
    • 84877308436 scopus 로고    scopus 로고
    • An efficient distributed localization algorithm for wireless sensor networks: Based on smart reference-selection method
    • A. M. Abu-Mahfouz and G. P. Hancke, "An efficient distributed localization algorithm for wireless sensor networks: Based on smart reference-selection method, " Intersci. J. Sensor Networks, 2012.
    • (2012) Intersci. J. Sensor Networks
    • Abu-Mahfouz, A.M.1    Hancke, G.P.2
  • 68
    • 80051781496 scopus 로고    scopus 로고
    • Inertial sensor-based indoor pedestrian localization with minimum 802. 15. 4a configuration
    • Aug.
    • S. Lee, B. Kim, H. Kim, R. Ha, and H. Cha, "Inertial sensor-based indoor pedestrian localization with minimum 802. 15. 4a configuration, " IEEE Trans. Ind. Inf., vol. 7, no. 3, pp. 455-466, Aug. 2011.
    • (2011) IEEE Trans. Ind. Inf , vol.7 , Issue.3 , pp. 455-466
    • Lee, S.1    Kim, B.2    Kim, H.3    Ha, R.4    Cha, H.5
  • 69
    • 84871743184 scopus 로고    scopus 로고
    • Localization-based radio model calibration for fault-tolerant wireless mesh networks
    • S. Ivanov and E. Nett, "Localization-based radio model calibration for fault-tolerant wireless mesh networks, " IEEE Trans. Ind. Inf., vol. PP, no. 99, 2012.
    • (2012) IEEE Trans. Ind. Inf. , vol.PP , Issue.99
    • Ivanov, S.1    Nett, E.2
  • 70
    • 84864549429 scopus 로고    scopus 로고
    • Server independent authentication scheme for RFID systems
    • B. Wang and M. MaAn, "Server independent authentication scheme for RFID systems, " IEEE Trans. Ind. Inf., vol. PP, no. 99, 2012.
    • (2012) IEEE Trans. Ind. Inf. , vol.PP , Issue.99
    • Wang, B.1    Maan, M.2
  • 71
    • 0013433454 scopus 로고
    • Identification tokens-or: Solving the chess grandmaster problem
    • Aug
    • T. Beth and Y. Desmedt, "Identification tokens-or: Solving the chess grandmaster problem, " in Proc. Adv. Cryptol., Aug. 1990, pp. 169-177.
    • (1990) Proc. Adv. Cryptol , pp. 169-177
    • Beth, T.1    Desmedt, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.