메뉴 건너뛰기




Volumn 21, Issue , 2013, Pages 1-13

A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols

Author keywords

Elliptic Curve Cryptosystem; ID Verifier Transfer; Radio Frequency Identification

Indexed keywords

AUTHENTICATION SCHEME; CHALLENGE RESPONSE PROTOCOLS; EFFICIENT COMPUTATION; ELLIPTIC CURVE CRYPTOSYSTEM; ID-VERIFIER TRANSFER; IDENTIFICATION OF PRODUCTS; MUTUAL AUTHENTICATION; SECURITY REQUIREMENTS;

EID: 84879295706     PISSN: 21903018     EISSN: 21903026     Source Type: Book Series    
DOI: 10.1007/978-3-642-35473-1_1     Document Type: Article
Times cited : (17)

References (36)
  • 2
    • 33751546328 scopus 로고    scopus 로고
    • Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards
    • Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computers Standards and Interfaces 29(2), 254-259 (2007)
    • (2007) Computers Standards and Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 5
    • 77957851534 scopus 로고    scopus 로고
    • Securing RFID systems conforming to EPC Class 1 Generation 2 standard
    • Yeh, T., Wang, Y., Kuo, T., Wang, S.: Securing RFID systems conforming to EPC Class 1 Generation 2 standard. Expert Systems with Applications 37, 7678-7683 (2010)
    • (2010) Expert Systems With Applications , vol.37 , pp. 7678-7683
    • Yeh, T.1    Wang, Y.2    Kuo, T.3    Wang, S.4
  • 6
    • 77952285870 scopus 로고    scopus 로고
    • Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements
    • Chien, H.Y., Huang, C.W.: Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements. ACM Operating System Rev. 41(2), 83-86 (2007)
    • (2007) ACM Operating System Rev , vol.41 , Issue.2 , pp. 83-86
    • Chien, H.Y.1    Huang, C.W.2
  • 7
    • 36248977046 scopus 로고    scopus 로고
    • Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
    • In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.), Springer, Boston
    • Li, T., Wang, G.: Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 109-120. Springer, Boston (2007)
    • (2007) New Approaches For Security, Privacy and Trust In Complex Environments. IFIP , vol.232 , pp. 109-120
    • Li, T.1    Wang, G.2
  • 9
    • 33845455482 scopus 로고    scopus 로고
    • EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags
    • In: Meersman, R., Tari, Z., Herrero, P. (eds.), Springer, Heidelberg
    • Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM Workshops 2006. LNCS, vol. 4277, pp. 352-361. Springer, Heidelberg (2006)
    • (2006) OTM Workshops 2006. LNCS , vol.4277 , pp. 352-361
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 10
    • 33750067948 scopus 로고    scopus 로고
    • 2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags
    • In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.), Springer, Heidelberg
    • 2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 912-923. Springer, Heidelberg (2006)
    • (2006) UIC 2006. LNCS , vol.4159 , pp. 912-923
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 11
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity
    • Chien, H.Y.: SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Trans. Dependable and Secure Computing 4(4), 337-340 (2007)
    • (2007) IEEE Trans. Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.Y.1
  • 12
    • 35048876270 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.), Springer, Heidelberg
    • Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing 2003. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
    • (2004) Security In Pervasive Computing 2003. LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 14
    • 41549156956 scopus 로고    scopus 로고
    • A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection
    • In: Chen, L., Mu, Y., Susilo, W. (eds.), Springer, Heidelberg
    • Lim, J., Oh, H., Kim, S.-J.: A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 278-289. Springer, Heidelberg (2008)
    • (2008) ISPEC 2008. LNCS , vol.4991 , pp. 278-289
    • Lim, J.1    Oh, H.2    Kim, S.-J.3
  • 15
    • 67349277179 scopus 로고    scopus 로고
    • A privacy and authentication protocol for passive RFID tags
    • Liu, A.X., Bailey, L.R.A.: A privacy and authentication protocol for passive RFID tags. Computer Communications 32, 1194-1199 (2009)
    • (2009) Computer Communications , vol.32 , pp. 1194-1199
    • Liu, A.X.1    Bailey, L.R.A.2
  • 16
    • 57049150751 scopus 로고    scopus 로고
    • A study on secure RFID mutual authentication scheme in pervasive
    • Kang, S.Y., Lee, D.G., Lee, I.Y.: A study on secure RFID mutual authentication scheme in pervasive. Computer Communications 31, 4248-4254 (2008)
    • (2008) Computer Communications , vol.31 , pp. 4248-4254
    • Kang, S.Y.1    Lee, D.G.2    Lee, I.Y.3
  • 17
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • Cho, J.S., Yeo, S.S., Kim, S.K.: Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. Computer Communications 34, 391-397 (2011)
    • (2011) Computer Communications , vol.34 , pp. 391-397
    • Cho, J.S.1    Yeo, S.S.2    Kim, S.K.3
  • 21
    • 53749094694 scopus 로고    scopus 로고
    • Public key cryptography based privacy preserving multi-context RFID infrastructure
    • Kaya, S.V., Savas, E., Levi, A., Erçetin, Ö.: Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Networks 7, 136-152 (2009)
    • (2009) Ad Hoc Networks , vol.7 , pp. 136-152
    • Kaya, S.V.1    Savas, E.2    Levi, A.3    Erçetin, Ö.4
  • 23
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203-209 (1987)
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 26
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues
    • Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues. Computer Networks 52, 2373-2380 (2008)
    • (2008) Computer Networks , vol.52 , pp. 2373-2380
    • Chen, Y.1    Chou, J.S.2    Sun, H.M.3
  • 27
    • 77949562527 scopus 로고    scopus 로고
    • Cryptanalysis of some RFID authentication protocols
    • Cao, T., Shen, P.: Cryptanalysis of some RFID authentication protocols. Journal of Communications 3(7) (December 2008)
    • (2008) Journal of Communications , vol.3 , Issue.7
    • Cao, T.1    Shen, P.2
  • 28
    • 78751649779 scopus 로고    scopus 로고
    • Improvement of the RFID authentication scheme based on quadratic residues
    • Yeh, T.C., Wua, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 34, 337-341 (2011)
    • (2011) Computer Communications , vol.34 , pp. 337-341
    • Yeh, T.C.1    Wua, C.H.2    Tseng, Y.M.3
  • 29
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203-209 (1987)
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 30
    • 33745654539 scopus 로고    scopus 로고
    • RFID-Tags for Anti-counterfeiting
    • In: Pointcheval, D. (ed.), Springer, Heidelberg
    • Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
    • (2006) CT-RSA 2006. LNCS , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 31
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
    • Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol. In: IEEE International Conference on RFID, pp. 97-104 (2008)
    • (2008) IEEE International Conference On RFID , pp. 97-104
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 33
    • 0000537828 scopus 로고
    • Efficient Identification and Signatures for Smart Cards
    • In: Brassard, G. (ed.), Springer, Heidelberg
    • Schnorr, C.-P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-252. Springer, Heidelberg (1990)
    • (1990) CRYPTO 1989. LNCS , vol.435 , pp. 239-252
    • Schnorr, C.-P.1
  • 34
    • 84875762817 scopus 로고
    • Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
    • In: Brickell, E.F. (ed.), Springer, Heidelberg
    • Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
    • (1993) CRYPTO 1992. LNCS , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 36
    • 58449108568 scopus 로고    scopus 로고
    • Cryptanalysis of EC-RAC, a RFID Identification Protocol
    • In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.), Springer, Heidelberg
    • Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID Identification Protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 149-161. Springer, Heidelberg (2008)
    • (2008) CANS 2008. LNCS , vol.5339 , pp. 149-161
    • Bringer, J.1    Chabanne, H.2    Icart, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.