메뉴 건너뛰기




Volumn 12, Issue 10, 2013, Pages 2037-2049

Privacy-friendly authentication in RFID systems: On sublinear protocols based on symmetric-key cryptography

Author keywords

attacks; authentication; complexity; privacy; RFID

Indexed keywords

ATTACKS; AUTHENTICATION PROTOCOLS; COMPLEXITY; COMPREHENSIVE ANALYSIS; INTERNATIONAL REGULATIONS; LARGE-SCALE APPLICATIONS; SYMMETRIC KEY CRYPTOGRAPHY; UBIQUITOUS TECHNOLOGY;

EID: 84883171665     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2012.174     Document Type: Article
Times cited : (49)

References (73)
  • 14
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B.H. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, vol. 37, pp. 422-426, 1970.
    • (1970) Comm. ACM , vol.37 , pp. 422-426
    • Bloom, B.H.1
  • 17
    • 0035015894 scopus 로고    scopus 로고
    • Using multiple hash functions to improve ip lookups
    • A. Broder and M. Mitzenmacher, "Using Multiple Hash Functions to Improve IP Lookups," Proc. IEEE INFOCOM, 2001.
    • (2001) Proc. IEEE INFOCOM
    • Broder, A.1    Mitzenmacher, M.2
  • 25
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of epc class 1 generation 2 standards rfid system with mutual authentication and privacy protection
    • C.-L. Chen and Y.-Y. Deng, "Conformation of EPC Class 1 Generation 2 Standards RFID System with Mutual Authentication and Privacy Protection," Eng. Applications of Artificial Intelligence, vol. 22, pp. 1284-1291, 2009.
    • (2009) Eng. Applications of Artificial Intelligence , vol.22 , pp. 1284-1291
    • Chen, C.-L.1    Deng, Y.-Y.2
  • 26
    • 84858987184 scopus 로고    scopus 로고
    • Reducing rfid reader load with the meet-in-the-middle strategy
    • J.H. Cheon, J. Hong, and G. Tsudik, "Reducing RFID Reader Load with the Meet-in-the-Middle Strategy," J. Comm. and Networks, vol. 14, pp. 10-14, 2012.
    • (2012) J. Comm. and Networks , vol.14 , pp. 10-14
    • Cheon, J.H.1    Hong, J.2    Tsudik, G.3
  • 27
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • DOI 10.1109/TDSC.2007.70226
    • H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 4, pp. 337-340, Oct.-Dec. 2007. (Pubitemid 350125898)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 28
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • DOI 10.1016/j.csi.2006.04.004, PII S092054890600064X
    • H.-Y. Chien and C.-H. Chen, "Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards," Computer Standards & Interfaces, vol. 29, pp. 254-259, 2007. (Pubitemid 44829930)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 30
    • 0017501281 scopus 로고
    • Exhaustive cryptanalysis of the nbs data encryption standard
    • W. Diffie and M. Hellman, "Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard," Computer, vol. 10, no. 6, pp. 74-84, June 1977. (Pubitemid 8574342)
    • (1977) Computer , vol.10 , Issue.6 , pp. 74-84
    • Diffie, W.1    Hellman Martin, E.2
  • 33
    • 79952915179 scopus 로고    scopus 로고
    • Using hb family of protocols for privacy-preserving authentication of rfid tags in a population
    • T. Halevi, N. Saxena, and S. Halevi, "Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population," Proc. Workshop RFID Security (RFIDSec '09), 2009.
    • (2009) Proc. Workshop RFID Security (RFIDSec '09)
    • Halevi, T.1    Saxena, N.2    Halevi, S.3
  • 34
    • 64249134316 scopus 로고    scopus 로고
    • Vulnerability of an rfid authentication protocol conforming to epc class 1 generation 2 standards
    • D. Han and D. Kwon, "Vulnerability of an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standards," Computer Standards Interfaces, vol. 31, pp. 648-652, 2009.
    • (2009) Computer Standards Interfaces , vol.31 , pp. 648-652
    • Han, D.1    Kwon, D.2
  • 36
    • 0019038335 scopus 로고
    • A cryptanalytic time-memory trade-off
    • July
    • M. Hellman, "A Cryptanalytic Time-Memory Trade-Off," IEEE Trans. Information Theory, vol. 26, no. 4, pp. 401-406, July 1980.
    • (1980) IEEE Trans. Information Theory , vol.26 , Issue.4 , pp. 401-406
    • Hellman, M.1
  • 44
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, vol. 24, pp. 770-771, 1981.
    • (1981) Comm. ACM , vol.24 , pp. 770-771
    • Lamport, L.1
  • 46
    • 54049143316 scopus 로고    scopus 로고
    • Elliptic-curve-based security processor for rfid
    • Nov.
    • Y.K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic-Curve-Based Security Processor for RFID," IEEE Trans. Computers, vol. 57, no. 11, pp. 1514-1517, Nov. 2008.
    • (2008) IEEE Trans. Computers , vol.57 , Issue.11 , pp. 1514-1517
    • Lee, Y.K.1    Sakiyama, K.2    Batina, L.3    Verbauwhede, I.4
  • 49
    • 34247523203 scopus 로고    scopus 로고
    • HB-MP: A further step in the HB-family of lightweight authentication protocols
    • DOI 10.1016/j.comnet.2007.01.011, PII S1389128607000242, Advances in Smart Cards
    • J. Munilla and A. Peinado, "HB-MP: A Further Step in the HB-Family of Lightweight Authentication Protocols," Computer Networks, vol. 51, pp. 2262-2267, 2007. (Pubitemid 46654842)
    • (2007) Computer Networks , vol.51 , Issue.9 , pp. 2262-2267
    • Munilla, J.1    Peinado, A.2
  • 64
    • 84883159079 scopus 로고    scopus 로고
    • Commission recommendation of 12.05.2009-sec(2009) 585/586, on the implementation of privacy and data protection principles in applications supported by radio-frequency identification
    • May
    • V. Reding, "Commission Recommendation of 12.05.2009-sec(2009) 585/586, on the Implementation of Privacy and Data Protection Principles in Applications Supported by Radio-Frequency Identification," Commission of the European Communities, May 2009.
    • (2009) Commission of the European Communities
    • Reding, V.1
  • 66
  • 73
    • 77957851534 scopus 로고    scopus 로고
    • Securing rfid systems conforming to epc class 1 generation 2 standard
    • T.-C. Yeh, Y.-J. Wang, T.-C. Kuo, and S.-S. Wang, "Securing RFID Systems Conforming to EPC Class 1 Generation 2 Standard," Expert System Applications, vol. 37, pp. 7678-7683, 2010.
    • (2010) Expert System Applications , vol.37 , pp. 7678-7683
    • Yeh, T.-C.1    Wang, Y.-J.2    Kuo, T.-C.3    Wang, S.-S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.