메뉴 건너뛰기




Volumn 8, Issue 9, 2013, Pages 2405-2412

An one-way hash function based lightweight mutual authentication RFID protocol

Author keywords

Authentication protocol; Logical analysis; Privacy; Rfid; Security

Indexed keywords

AUTHENTICATION PROTOCOLS; COMMUNICATION OVERLOAD; LOGICAL ANALYSIS; MUTUAL AUTHENTICATION PROTOCOLS; ONE WAY HASH FUNCTIONS; SECURITY; SECURITY AND PERFORMANCE; SECURITY AND PRIVACY ISSUES;

EID: 84883728510     PISSN: 1796203X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcp.8.9.2405-2412     Document Type: Article
Times cited : (7)

References (25)
  • 1
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • February
    • H. Chien and C. Chen, Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2):254-259, February 2007.
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.1    Chen, C.2
  • 2
    • 84883724489 scopus 로고    scopus 로고
    • Enhancing Security of EPCGlobal Gen-2 RFID against Traceability and cloning
    • Dang Nguyen Duc, Hyunrok Lee and Kwangjo Kim. Enhancing Security of EPCGlobal Gen-2 RFID against Traceability and cloning. Auto-ID Labs White Paper WPSWNET- 016, 2006.
    • (2006) Auto-ID Labs White Paper WPSWNET- , pp. 016
    • Duc, D.N.1    Lee, H.2    Kim, K.3
  • 3
    • 70449119277 scopus 로고    scopus 로고
    • Security and privacy risks of embedded RFID in everyday things: The e-passport and beyond
    • Meingast Marci, King Jennifer and Mulligan Deirdre K. Security and privacy risks of embedded RFID in everyday things: The e-passport and beyond. Journal of Communications, v 2, n 7, p 36-48, 2007.
    • (2007) Journal of Communications , vol.2 , Issue.7 , pp. 36-48
    • Marci, M.1    Jennifer, K.2    Mulligan, D.K.3
  • 4
    • 84865164900 scopus 로고    scopus 로고
    • RFID-based electronic identity security cloud platform in cyberspace
    • Chen Bing, Tan Chengxiang, Jin Bo, Zou Xiang and Dai Yuebo. RFID-based electronic identity security cloud platform in cyberspace. Journal of Networks, v 7, n 7, p 1131-1138, 2012.
    • (2012) Journal of Networks , vol.7 , Issue.7 , pp. 1131-1138
    • Bing, C.1    Chengxiang, T.2    Bo, J.3    Xiang, Z.4    Yuebo, D.5
  • 5
    • 77949852436 scopus 로고    scopus 로고
    • Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols
    • MARCH
    • Gaurav Kapoor and Selwyn Piramuthu. Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols. IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 3, MARCH 2010.
    • (2010) IEEE COMMUNICATIONS LETTERS , vol.12 , Issue.3
    • Kapoor, G.1    Piramuthu, S.2
  • 6
    • 43449134072 scopus 로고    scopus 로고
    • Lightweight cryptographic authentication in passive RFID-tagged systems
    • S. Piramuthu, "Lightweight cryptographic authentication in passive RFID-tagged systems," IEEE Trans. Systems, Man, and Cybernetics -Part C, vol. 38, no. 3, pp. 360-376, 2008.
    • (2008) IEEE Trans. Systems, Man, and Cybernetics -Part C , vol.38 , Issue.3 , pp. 360-376
    • Piramuthu, S.1
  • 8
    • 80455155201 scopus 로고    scopus 로고
    • Zero-Knowledge Authentication Protocol Based on Alternative Mode in RFID Systems'
    • H. Liu, H. Ning,:' Zero-Knowledge Authentication Protocol Based on Alternative Mode in RFID Systems', IEEE Sensors Journal, Dec. 2011,Vol. 11, No. 12, pp.3235-3245.
    • (2011) IEEE Sensors Journal , vol.11 , Issue.12 , pp. 3235-3245
    • Liu, H.1    Ning, H.2
  • 9
    • 80053220372 scopus 로고    scopus 로고
    • Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems'
    • H. Ning, H. Liu, J. Mao, Y. Zhang.:' Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems', IET Communications, 2011,vol. 5, lss.12, pp.1755-1768
    • (2011) IET Communications , vol.5 , Issue.12 , pp. 1755-1768
    • Ning, H.1    Liu, H.2    Mao, J.3    Zhang, Y.4
  • 10
    • 67649484364 scopus 로고    scopus 로고
    • A Gen2-based RFID authentication protocol for security and privacy
    • Sun, H.M., Ting, W.C.: 'A Gen2-based RFID authentication protocol for security and privacy', IEEE Trans. Mob. Comput. 2009, 8, (8), pp. 1052-1062
    • (2009) IEEE Trans. Mob. Comput , vol.8 , Issue.8 , pp. 1052-1062
    • Sun, H.M.1    Ting, W.C.2
  • 11
    • 84870563092 scopus 로고    scopus 로고
    • Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel
    • JANUARY
    • K. Sakai, W. Ku, R. Zimmermann, M. Sun, Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel. IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 1, JANUARY 2013,pp.112-123
    • (2013) IEEE TRANSACTIONS ON COMPUTERS , vol.62 , Issue.1 , pp. 112-123
    • Sakai, K.1    Ku, W.2    Zimmermann, R.3    Sun, M.4
  • 12
    • 84862788058 scopus 로고    scopus 로고
    • A New Ultralightweight RFID Authentication Protocol with Permutation
    • MAY
    • Y. Tian, G. Chen, and J. Li. A New Ultralightweight RFID Authentication Protocol with Permutation. IEEE COMMUNICATIONS LETTERS, VOL. 16, NO. 5, MAY 2012, pp.702-705
    • (2012) IEEE COMMUNICATIONS LETTERS , vol.16 , Issue.5 , pp. 702-705
    • Tian, Y.1    Chen G.Li, J.2
  • 13
    • 56749103027 scopus 로고    scopus 로고
    • RFID authentication protocol for Low-cost Tags
    • March
    • B. Song and C. J Mitchell, RFID authentication protocol for Low-cost Tags, In the Proceedings of WiSec'08, March 2008, pp. 140-147.
    • (2008) In the Proceedings of WiSec'08 , pp. 140-147
    • Song, B.1    Mitchell, C.J.2
  • 14
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Rhee, K., Kwak, J., Kim, S., Won, D.: 'Challenge-response based RFID authentication protocol for distributed database environment', Secur. Pervasive Comput., 2005, 3450, pp. 70-84
    • (2005) Secur. Pervasive Comput , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 15
    • 84865741288 scopus 로고    scopus 로고
    • A minimum disclosure approach to authentication and privacy in RFID systems
    • R. Doss, W. Zhou, S. Sundaresan, S. Yu, L. Gao. A minimum disclosure approach to authentication and privacy in RFID systems. Computer Networks 56 (2012) 3401-3416.
    • (2012) Computer Networks , vol.56 , pp. 3401-3416
    • Doss, R.1    Zhou, W.2    Sundaresan, S.3    Yu, S.4    Gao, L.5
  • 16
    • 84864549429 scopus 로고    scopus 로고
    • A Server Independent Authentication Scheme for RFID Systems
    • Bin Wang and Maode Ma. A Server Independent Authentication Scheme for RFID Systems. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 8, NO. 3, AUG. 2012,pp.689-696
    • (2012) IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS , vol.8 , Issue.3 , pp. 689-696
    • Wang, B.1    Ma, M.2
  • 19
    • 0025023289 scopus 로고
    • Reasoning about belief in cryptographic protocols
    • Research in Security and Privacy, California, USA, May
    • Gong, L., Needham, R., Yahalom, R.: 'Reasoning about belief in cryptographic protocols'. Proc. IEEE Computer Society Symp. Research in Security and Privacy, California, USA, May 1990,pp. 234-248
    • (1990) Proc. IEEE Computer Society Symp , pp. 234-248
    • Gong, L.1    Needham, R.2    Yahalom, R.3
  • 20
    • 77954279962 scopus 로고    scopus 로고
    • Security analysis of the simple lightweight authentication protocol
    • French Alps, France
    • Godor, G., Imre, S.: Security analysis of the simple lightweight authentication protocol'. Proc. 2010 Ninth Int. Conf. Networks (ICN), French Alps, France, April 2010, pp. 231-236
    • (2010) Proc. 2010 Ninth Int. Conf. Networks (ICN) , pp. 231-236
    • Godor, G.1    Imre, S.2
  • 21
    • 73049106910 scopus 로고    scopus 로고
    • Optimization between AES security and performance for IEEE 802.15.3 WPAN
    • Olteanu, A., Xiao, Y., Zhang, Y.: 'Optimization between AES security and performance for IEEE 802.15.3 WPAN', IEEE Trans. Wirel. Commun., 2009, 8, (12), pp. 6030- 6037
    • (2009) IEEE Trans. Wirel. Commun , vol.8 , Issue.12 , pp. 6030-6037
    • Olteanu, A.1    Xiao, Y.2    Zhang, Y.3
  • 24
    • 84883677433 scopus 로고    scopus 로고
    • Final report of European project IST-1999- 12324: New European schemes for signatures, integrity, and encryption. Available at, April
    • B. Preneel et al. Final report of European project IST-1999- 12324: New European schemes for signatures, integrity, and encryption. Available at: www.cosic.esat.kuleuven.be/nessie/, April 2004.
    • (2004)
    • Preneel, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.