메뉴 건너뛰기




Volumn 2012, Issue , 2012, Pages

Secure ubiquitous authentication protocols for RFID systems

Author keywords

Authentication protocol; Hash address; RFID; Security; Ubiquitous

Indexed keywords

AUTHENTICATION PROTOCOLS; HASH ADDRESS; HASH VALUE; PRIVACY AND SECURITY; RANDOM NUMBERS; RFID PROTOCOLS; RFID SYSTEMS; SEARCH TIME; SECURITY; UBIQUITOUS; UBIQUITOUS COMPUTING ENVIRONMENT;

EID: 84872843928     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1186/1687-1499-2012-93     Document Type: Article
Times cited : (10)

References (23)
  • 1
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • DOI 10.1109/MSP.2005.78
    • A Jules, S Garfinkel, R Pappu, RFID privacy: an overview of problems and proposed solutions. IEEE Security Privacy. 3(3), 34-43 (2005). doi:10.1109/MSP.2005.78 (Pubitemid 40860471)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 2
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • A Jules, RFID security and privacy: a research survey. IEEE J Sel Areas Commun. 24(2), 1-19 (2006)
    • (2006) IEEE J Sel Areas Commun. , vol.24 , Issue.2 , pp. 1-19
    • Jules, A.1
  • 3
    • 32844471136 scopus 로고    scopus 로고
    • An introduction to RFID technology
    • DOI 10.1109/MPRV.2006.2
    • R Want, An introduction to RFID technology. IEEE Pervasive Comput. 5, 25-33 (2005) (Pubitemid 43254240)
    • (2006) IEEE Pervasive Computing , vol.5 , Issue.1 , pp. 25-33
    • Want, R.1
  • 6
    • 2942556410 scopus 로고    scopus 로고
    • Radio-frequency identifcation: Security risks and challenges
    • S Sarma, S Weis, D Engels, Radio-frequency identifcation: security risks and challenges. CryptoBytes. 6(1), 2-9 (2003)
    • (2003) CryptoBytes. , vol.6 , Issue.1 , pp. 2-9
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 7
    • 18744409344 scopus 로고    scopus 로고
    • The blocker tag: Selective blocking of RFID tags for consumer privacy
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • A Juels, RL Rivest, M Szudlo, The blocker tag: selective blocking of RFID tags for consumer privacy, in the 8th ACM Conference on Computer and Communications Security, (ACM Press, Washington DC, USA, 2003), pp. 103-111 (Pubitemid 40673793)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 103-111
    • Juels, A.1    Rivest, R.L.2    Szydlo, M.3
  • 8
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Lecture Notes in Computer Science, doi:10.1007/978-3-540-39881-3-18
    • SA Weis, SE Sarma, RL Rivest, DW Engels, Security and privacy aspects of low-cost radio frequency identification systems, in Security in Pervasive Computing, vol. 2802. (Lecture Notes in Computer Science, 2004), pp. 201-212. doi:10.1007/978-3-540-39881-3-18
    • (2004) Security in Pervasive Computing , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 9
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • DOI 10.1016/j.csi.2006.04.004, PII S092054890600064X
    • H Chien, C Chen, Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Comput Standard Interface. 29(2), 254-259 (2007). doi:10.1016/j.csi.2006.04.004 (Pubitemid 44829930)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 10
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to "privacyfriendly" tags
    • MA, USA, November
    • M Ohkubo, K Suzki, S Kinoshita, Cryptographic approach to "privacyfriendly" tags, in RFID Privacy Workshop, MIT, MA, USA http://rfidprivacy media.mit.edu/2003/papers/ohkubo.pdf (November 2003)
    • (2003) RFID Privacy Workshop, MIT
    • Ohkubo, M.1    Suzki, K.2    Kinoshita, S.3
  • 11
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers
    • Sandhu R, Thomas R IEEE Computer Society, Orlando, FL, USA, March
    • D Henrici, P Muller, Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers. in International Workshop on Pervasive Computing and Communication Security-PerSec 2004, ed. by Sandhu R, Thomas R IEEE Computer Society, Orlando, FL, USA 149-153 (March 2004)
    • (2004) International Workshop on Pervasive Computing and Communication Security-PerSec 2004 , pp. 149-153
    • Henrici, D.1    Muller, P.2
  • 12
    • 24944582157 scopus 로고    scopus 로고
    • Efficient authentication for low-cost RFID systems
    • LNCS Springer-Verlas
    • SM Lee, YJ Hwang, DH Lee, JI Lim, Efficient authentication for low-cost RFID systems, in ICCSA05, LNCS, vol. 3480. (Springer-Verlag, 2005), pp. 619-629
    • (2005) ICCSA05 , vol.3480 , pp. 619-629
    • Lee, S.M.1    Hwang, Y.J.2    Lee, D.H.3    Lim, J.I.4
  • 14
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID issues, practices, and architectures
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • D Molnar, D Wagner, Privacy and Security in Library RFID: Issues, Practices, and Architectures, in Conference on Computer and Communications Security ed. by Pfitzmann B, Liu P (ACM CCS, Washington, DC, USA, 2004), pp. 210-219. ACM Press (Pubitemid 40338202)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 15
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
    • K Rhee, J Kwak, S Kim, D Won, Challenge-response based RFID authentication protocol for distributed database environment. SPC 2005, LNCS 3450 70-84 (2005) (Pubitemid 41274193)
    • (2005) Lecture Notes in Computer Science , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 18
    • 38149050502 scopus 로고    scopus 로고
    • A family of dunces: Trivial RFID identification and authentication protocols
    • Lecture Notes in Computer Science, ed. by Borisov N, Golle P Ottawa, Canada, Springer-Verlag, Berlin
    • G Tsudik, A family of dunces: trivial RFID identification and authentication protocols, in 7th International Symposium on Privacy Enhancing Technologies-PET 2007, Lecture Notes in Computer Science, vol. 4776, ed. by Borisov N, Golle P (Ottawa, Canada, 2007), pp. 45-61. Springer-Verlag, Berlin
    • (2007) 7th International Symposium on Privacy Enhancing Technologies-PET 2007 , vol.4776 , pp. 45-61
    • Tsudik, G.1
  • 21
  • 22
    • 70349155465 scopus 로고    scopus 로고
    • Attacks and improvements to an RFID mutual authentication protocol and its extensions
    • Zurich, Switzerland
    • S Cai, Y Li, T Li, RH Deng, Attacks and improvements to an RFID mutual authentication protocol and its extensions, in WiSec'09, (Zurich, Switzerland, 2009), pp. 51-58
    • (2009) WiSec'09 , pp. 51-58
    • Cai, S.1    Li, Y.2    Li, T.3    Deng, R.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.