메뉴 건너뛰기




Volumn 6, Issue 10, 2013, Pages 1177-1197

User-centric secure integration of personal RFID tags and sensor networks

Author keywords

Body sensor network; Personal networks; RFID security; Secure architecture

Indexed keywords

AUTHENTICATION; BODY SENSOR NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ARCHITECTURE; RADIO FREQUENCY IDENTIFICATION (RFID);

EID: 84884730951     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.684     Document Type: Article
Times cited : (8)

References (52)
  • 1
    • 84884712844 scopus 로고    scopus 로고
    • International Telecommunication Union. ITU Internet Reports 2005. The Internet of Things, November
    • International Telecommunication Union. ITU Internet Reports 2005. The Internet of Things, November 2005, http://www.itu.int/osg/spu/publications/internetofthings
    • (2005)
  • 2
    • 79951677671 scopus 로고    scopus 로고
    • Distance bounding protocol for mutual authentication. IEEE Transactions on Wireless Communications
    • Yum DH, Kim JS, Hong SJ, Lee PJ. Distance bounding protocol for mutual authentication. IEEE Transactions on Wireless Communications 2011; 10(2): 592-601.
    • (2011) , vol.10 , Issue.2 , pp. 592-601
    • Yum, D.H.1    Kim, J.S.2    Hong, S.J.3    Lee, P.J.4
  • 3
    • 84884709438 scopus 로고    scopus 로고
    • RFID mutual authentication protocols. Decision Support Systems, Elsevier
    • Piramuthu S. RFID mutual authentication protocols. Decision Support Systems, Elsevier (in press), 2010.
    • (2010)
    • Piramuthu, S.1
  • 4
    • 78650590814 scopus 로고    scopus 로고
    • Impossibility results for RFID privacy notions. Transaction on Computational Science XI
    • Armknecht F, Sadeghi A-R, Scafuro A, Visconti I, Wachsmann C. Impossibility results for RFID privacy notions. Transaction on Computational Science XI (6480) 2010; 39-63.
    • (2010) , pp. 39-63
    • Armknecht, F.1    Sadeghi, A.-R.2    Scafuro, A.3    Visconti, I.4    Wachsmann, C.5
  • 5
    • 78049383154 scopus 로고    scopus 로고
    • Privacy versus scalability in radio frequency identification systems
    • Alomair B, Poovendran R. Privacy versus scalability in radio frequency identification systems. Computer Communications, 2010; 33(18): 2155-2163.
    • (2010) Computer Communications , vol.33 , Issue.18 , pp. 2155-2163
    • Alomair, B.1    Poovendran, R.2
  • 6
    • 77953892886 scopus 로고    scopus 로고
    • Cryptographic puzzles and distance-bounding protocols: practical tools for RFID security. IEEE International Conference on RFID-IEEE RFID 2010, IEEE, IEEE Computer Society, Orlando, Florida, USA
    • Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Palomar E, van der Lubbe JCA. Cryptographic puzzles and distance-bounding protocols: practical tools for RFID security. IEEE International Conference on RFID-IEEE RFID 2010, IEEE, IEEE Computer Society, Orlando, Florida, USA, 2010; 45-52.
    • (2010) , pp. 45-52
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Palomar, E.4    van der Lubbe, J.C.A.5
  • 7
    • 78650114205 scopus 로고    scopus 로고
    • A lightweight implementation of Keccak hash function for radio-frequency identification applications
    • Yalcin SO (ed). Springer: Istanbul, Turkey
    • Kavun EB, Yalcin T. A lightweight implementation of Keccak hash function for radio-frequency identification applications. In Workshop on RFID Security-RFIDSec'10', Yalcin SO (ed). Springer: Istanbul, Turkey, 2010; 258-269.
    • (2010) Workshop on RFID Security-RFIDSec'10' , pp. 258-269
    • Kavun, E.B.1    Yalcin, T.2
  • 8
    • 84884710937 scopus 로고    scopus 로고
    • Secure personal network, IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008. PIMRC
    • Anggraeni PN, Prasad NR, Prasad R. Secure personal network, IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008. PIMRC 2008; 1-5.
    • (2008) , pp. 1-5
    • Anggraeni, P.N.1    Prasad, N.R.2    Prasad, R.3
  • 9
    • 63749088611 scopus 로고    scopus 로고
    • Secure and Dynamic Cooperation of Personal Networks in a Fednet, 6th IEEE Consumer Communications and Networking Conference, 2009. CCNC 2009.
    • Malohat Ibrohimovna, Sonia Heemstra de Groot, Jinglong Zhou. Secure and Dynamic Cooperation of Personal Networks in a Fednet, 6th IEEE Consumer Communications and Networking Conference, 2009. CCNC 2009. 2009; 8-14.
    • (2009) , pp. 8-14
    • Malohat, I.1    Sonia, H.d.G.2    Jinglong, Z.3
  • 10
    • 84884708085 scopus 로고    scopus 로고
    • Project IST-FP6-IP-027396, Magnet Beyond. , last accessed: March 2012.
    • Project IST-FP6-IP-027396, Magnet Beyond. http://cordis.europa.eu/projects/80699_en.html, last accessed: March 2012.
  • 11
    • 77955114580 scopus 로고    scopus 로고
    • RFID added value sensing capabilities: European advances in integrated RFID-WSN middleware. 2010 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON)
    • Anggorjati B, Çetin K, Mihovska A, Prasad N. RFID added value sensing capabilities: European advances in integrated RFID-WSN middleware. 2010 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), 2010; 1-3.
    • (2010) , pp. 1-3
    • Anggorjati, B.1    Çetin, K.2    Mihovska, A.3    Prasad, N.4
  • 12
    • 56549103722 scopus 로고    scopus 로고
    • The research of network architecture in warehouse management system based on RFID and WSN integration. IEEE International Conference on Automation and Logistics, ICAL
    • Xiaoguang Z, Wei L. The research of network architecture in warehouse management system based on RFID and WSN integration. IEEE International Conference on Automation and Logistics, ICAL 2008; 2556-2560.
    • (2008) , pp. 2556-2560
    • Xiaoguang, Z.1    Wei, L.2
  • 13
    • 78651112967 scopus 로고    scopus 로고
    • Next generation RFID-based medical service management system architecture in wireless sensor network
    • Kim T-h, Chang AC-C, Li M, Rong C, Patrikakis CZ, Slezak D (eds). Springer Berlin: Heidelberg, 10.1007/978-3-642-17587-9_17
    • Tolentino RS, Lee K, Kim Y-T, Park G-C. Next generation RFID-based medical service management system architecture in wireless sensor network. In Communication and Networking, Kim T-h, Chang AC-C, Li M, Rong C, Patrikakis CZ, Slezak D (eds). Springer Berlin: Heidelberg, 2010; 147-154. 10.1007/978-3-642-17587-9_17
    • (2010) Communication and Networking , pp. 147-154
    • Tolentino, R.S.1    Lee, K.2    Kim, Y.-T.3    Park, G.-C.4
  • 14
    • 84884718105 scopus 로고    scopus 로고
    • Secure architecture for the integration of RFID and sensors in personal networks. 7th International Workshop on Security and Trust Management (STM11), Springer, Copenhagen, Denmark, In Press.
    • Najera P, Roman R, Lopez J. Secure architecture for the integration of RFID and sensors in personal networks. 7th International Workshop on Security and Trust Management (STM11), Springer, Copenhagen, Denmark, In Press.
    • Najera, P.1    Roman, R.2    Lopez, J.3
  • 15
    • 84884707198 scopus 로고    scopus 로고
    • Ecma International. Technical Report TR/102, Personal Networks-Overview and Standardization Needs. 1st Edition, December 2010.
    • Ecma International. Technical Report TR/102, Personal Networks-Overview and Standardization Needs. 1st Edition, December 2010.
  • 16
    • 84884724357 scopus 로고    scopus 로고
    • RFID Security and Privacy Lounge. , last accessed: March 2012.
    • RFID Security and Privacy Lounge. http://www.avoine.net/rfid/index.php, last accessed: March 2012.
  • 17
    • 67650336836 scopus 로고    scopus 로고
    • Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents.
    • Najera P, Moyano F, Lopez J. Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. Journal of Universal Computer Science 2009; 15(5): 970-991.
    • (2009) Journal of Universal Computer Science , vol.15 , Issue.5 , pp. 970-991
    • Najera, P.1    Moyano, F.2    Lopez, J.3
  • 18
    • 84884714737 scopus 로고    scopus 로고
    • Workshop on RFID Security-RFIDSec Asia'10. IOS Press: Singapore, Republic of Singapore
    • Aigner M. Security in the Internet of Things. Workshop on RFID Security-RFIDSec Asia'10. IOS Press: Singapore, Republic of Singapore, 2010.
    • (2010) Security in the Internet of Things
    • Aigner, M.1
  • 20
    • 84884722325 scopus 로고    scopus 로고
    • Google Nexus. , last accessed: March 2012.
    • Google Nexus. http://www.google.com/nexus/tech-specs.html, last accessed: March 2012.
  • 21
    • 84884714444 scopus 로고    scopus 로고
    • Blackberry Bold 9900. , last accessed: March 2012.
    • Blackberry Bold 9900. http://worldwide.blackberry.com/blackberrybold/blackberry-bold-9900-9930, last accessed: March 2012.
  • 22
    • 84884726332 scopus 로고    scopus 로고
    • Connecting passive RFID tags to the Internet of Things. Interconnecting Smart Objects with the Internet Workshop, Prague, Czech Republic
    • Dominikus S, Schmidt J-M. Connecting passive RFID tags to the Internet of Things. Interconnecting Smart Objects with the Internet Workshop, Prague, Czech Republic, 2011.
    • (2011)
    • Dominikus, S.1    Schmidt, J.-M.2
  • 24
    • 79151469014 scopus 로고    scopus 로고
    • Scalable RFID security protocols supporting tag ownership transfer
    • Song B, Mitchell CJ. Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 2011; 34(4): 556-566.
    • (2011) Computer Communications , vol.34 , Issue.4 , pp. 556-566
    • Song, B.1    Mitchell, C.J.2
  • 25
    • 84857500576 scopus 로고    scopus 로고
    • Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics
    • Kapoor G, Piramuthu S. Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics 2011; 42(2): 1-10.
    • (2011) , vol.42 , Issue.2 , pp. 1-10
    • Kapoor, G.1    Piramuthu, S.2
  • 26
    • 37849023446 scopus 로고    scopus 로고
    • The 6LoWPAN architecture. Proceedings of the 4th Workshop on Embedded Networked Sensors, ACM, New York, NY, USA
    • Mulligan G. The 6LoWPAN architecture. Proceedings of the 4th Workshop on Embedded Networked Sensors, ACM, New York, NY, USA, 2007; 78-82.
    • (2007) , pp. 78-82
    • Mulligan, G.1
  • 27
    • 78650530349 scopus 로고    scopus 로고
    • Securing Mobile Unattended WSNs against a Mobile Adversary. 2010 29th IEEE Symposium on Reliable Distributed Systems, IEEE Computer Society, Washington, DC, USA
    • Di Pietro R, Oligeri G, Soriente C, Tsudik G. Securing Mobile Unattended WSNs against a Mobile Adversary. 2010 29th IEEE Symposium on Reliable Distributed Systems, IEEE Computer Society, Washington, DC, USA, 2010; 11-20.
    • (2010) , pp. 11-20
    • Di Pietro, R.1    Oligeri, G.2    Soriente, C.3    Tsudik, G.4
  • 28
    • 77951265113 scopus 로고    scopus 로고
    • An architecture based on Internet of Things to support mobility and security in medical environments. Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE
    • Jara A, Zamora M, Skarmeta A. An architecture based on Internet of Things to support mobility and security in medical environments. Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE, 2010; 1-5.
    • (2010) , pp. 1-5
    • Jara, A.1    Zamora, M.2    Skarmeta, A.3
  • 29
    • 79960660075 scopus 로고    scopus 로고
    • On the hardware implementation cost of crypto-processors architectures, information systems security
    • A Taylor & Francis Group Publication
    • Sklavos N. On the hardware implementation cost of crypto-processors architectures, information systems security. The official journal of (ISC)2, A Taylor & Francis Group Publication 2010; 19(2): 53-60.
    • (2010) The official journal of (ISC)2 , vol.19 , Issue.2 , pp. 53-60
    • Sklavos, N.1
  • 30
    • 70349087741 scopus 로고    scopus 로고
    • A low-resource public-key identification scheme for RFID tags and sensor nodes. Proceedings of the second ACM conference on Wireless network security, ACM, New York, NY, USA
    • Oren Y, Feldhofer M. A low-resource public-key identification scheme for RFID tags and sensor nodes. Proceedings of the second ACM conference on Wireless network security, ACM, New York, NY, USA, 2009; 59-68.
    • (2009) , pp. 59-68
    • Oren, Y.1    Feldhofer, M.2
  • 31
    • 79952583451 scopus 로고    scopus 로고
    • Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags
    • Biryukov A, Gong G, Stinson D (eds). Springer Berlin: Heidelberg, 10.1007/978-3-642-19574-7_8
    • Plos T, Groß H, Feldhofer M. Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags. In Selected Areas in Cryptography, Biryukov A, Gong G, Stinson D (eds). Springer Berlin: Heidelberg, 2011; 114-129. 10.1007/978-3-642-19574-7_8,
    • (2011) Selected Areas in Cryptography , pp. 114-129
    • Plos, T.1    Groß, H.2    Feldhofer, M.3
  • 32
    • 84859727220 scopus 로고    scopus 로고
    • Lightweight cryptography for RFID tags
    • 10:2
    • Maimut D, Ouafi K. Lightweight cryptography for RFID tags. Security Privacy IEEE 2012; (10:2):76-79.
    • (2012) Security Privacy IEEE , pp. 76-79
    • Maimut, D.1    Ouafi, K.2
  • 34
    • 79957478734 scopus 로고    scopus 로고
    • Toward practical public key anti-counterfeiting for low-cost EPC tags. 2011 IEEE International Conference on RFID
    • Arbit A, Oren Y, Wool A. Toward practical public key anti-counterfeiting for low-cost EPC tags. 2011 IEEE International Conference on RFID, 2011; 38(1)184-191.
    • (2011) , vol.38 , Issue.1 , pp. 184-191
    • Arbit, A.1    Oren, Y.2    Wool, A.3
  • 35
    • 82155192490 scopus 로고    scopus 로고
    • Security implementation within GEN2 protocol. 2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), DOI: 10.1109/RFID.2011.5764620.
    • Seshabhattar S, Jagannatha S, Engels D. Security implementation within GEN2 protocol. 2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), 2011; 402-407. DOI: 10.1109/RFID.2011.5764620. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5764620&tag=1
    • (2011) , pp. 402-407
    • Seshabhattar, S.1    Jagannatha, S.2    Engels, D.3
  • 36
    • 52949134853 scopus 로고    scopus 로고
    • Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents. Proceedings of the 8th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, Springer-Verlag, Berlin, Heidelberg
    • Rolfes C, Poschmann A, Leander G, Paar C. Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents. Proceedings of the 8th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, Springer-Verlag, Berlin, Heidelberg, 2008; 89-103.
    • (2008) , pp. 89-103
    • Rolfes, C.1    Poschmann, A.2    Leander, G.3    Paar, C.4
  • 37
    • 84055192371 scopus 로고    scopus 로고
    • A hardware processor supporting elliptic curve cryptography for less than 9 kGEs
    • Prouff E (ed). Springer Berlin: Heidelberg, 10.1007/978-3-642-27257-8_12
    • Wenger E, Hutter M. A hardware processor supporting elliptic curve cryptography for less than 9 kGEs. In Smart Card Research and Advanced Applications, Prouff E (ed). Springer Berlin: Heidelberg, 2011; 182-198. 10.1007/978-3-642-27257-8_12
    • (2011) Smart Card Research and Advanced Applications , pp. 182-198
    • Wenger, E.1    Hutter, M.2
  • 38
    • 50249090558 scopus 로고    scopus 로고
    • First experiences with personal networks as an enabling platform for service providers. Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services 1-8, Philadelphia, August 2007.
    • den Hartog FTH, Blom MA, Peeters ME, et al. First experiences with personal networks as an enabling platform for service providers. Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 1-8, Philadelphia, August 2007.
    • den Hartog, F.T.H.1    Blom, M.A.2    Peeters, M.E.3
  • 39
    • 84884712890 scopus 로고    scopus 로고
    • Open Mobile Alliance, On the definition and architectural needs of Personal Networks. .
    • Open Mobile Alliance, On the definition and architectural needs of Personal Networks. 2008.
    • (2008)
  • 40
    • 84884717810 scopus 로고    scopus 로고
    • Open Mobile Alliance, OMA-TP-CPNS-2008-0027-INP-CPNS: CPNS Scope. .
    • Open Mobile Alliance, OMA-TP-CPNS-2008-0027-INP-CPNS: CPNS Scope. 2008.
    • (2008)
  • 41
    • 51649098804 scopus 로고    scopus 로고
    • CPFP: an efficient key management scheme for large scale personal networks. International Symposium on Wireless Pervasive Computing (ISWPC 2008).
    • Mirzadeh S, Armknecht F, Pallares JJ, et al. CPFP: an efficient key management scheme for large scale personal networks. International Symposium on Wireless Pervasive Computing 2008 (ISWPC 2008).
    • (2008)
    • Mirzadeh, S.1    Armknecht, F.2    Pallares, J.J.3
  • 42
    • 63749095662 scopus 로고    scopus 로고
    • Device authentication and registration method assisted by a cellular system for user-driven service creation architecture. 2009 6th IEEE Consumer Communications and Networking Conference. CCNC
    • Matsunaka T, Warabino T, Kishi Y, Nakauchi K, Umezawa T, Inoue M. Device authentication and registration method assisted by a cellular system for user-driven service creation architecture. 2009 6th IEEE Consumer Communications and Networking Conference. CCNC 2009; 1-5.
    • (2009) , pp. 1-5
    • Matsunaka, T.1    Warabino, T.2    Kishi, Y.3    Nakauchi, K.4    Umezawa, T.5    Inoue, M.6
  • 43
    • 44949139538 scopus 로고    scopus 로고
    • Authentication procedure and terminal switching scheme for PAN services. In Asia-Pacific Conference on Communications (APCC'06)
    • Fujino S, Motoyoshi G. Authentication procedure and terminal switching scheme for PAN services. In Asia-Pacific Conference on Communications (APCC'06), 2006; 1-5.
    • (2006) , pp. 1-5
    • Fujino, S.1    Motoyoshi, G.2
  • 46
    • 36349033618 scopus 로고    scopus 로고
    • Evaluating secure cluster formation in personal networks. Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE
    • Jehangir A, de Groot SH. Evaluating secure cluster formation in personal networks. Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, 2007; 3134-3140.
    • (2007) , pp. 3134-3140
    • Jehangir, A.1    de Groot, S.H.2
  • 47
    • 78049451613 scopus 로고    scopus 로고
    • Readers behaving badly
    • In, Lecture Notes in Computer Science, Gritzalis D, Preneel B, Theoharidou M (eds). Springer Berlin: Heidelberg,
    • Nithyanand R, Tsudik G, Uzun E. Readers behaving badly. In Computer Security ESORICS 2010, Lecture Notes in Computer Science, Gritzalis D, Preneel B, Theoharidou M (eds). Springer Berlin: Heidelberg, 2010; 19-36. http://dx.doi.org/10.1007/978-3-642-15497-3_2
    • (2010) Computer Security ESORICS 2010 , pp. 19-36
    • Nithyanand, R.1    Tsudik, G.2    Uzun, E.3
  • 49
    • 79961243703 scopus 로고    scopus 로고
    • A framework for managing composed multimedia delivery in personal networks. Multimedia Computing and Systems (ICMCS), 2011 International Conference on
    • Chaabane A, Louati W, Jmaiel M. A framework for managing composed multimedia delivery in personal networks. Multimedia Computing and Systems (ICMCS), 2011 International Conference on, 2011; 1-6.
    • (2011) , pp. 1-6
    • Chaabane, A.1    Louati, W.2    Jmaiel, M.3
  • 52
    • 77955869819 scopus 로고    scopus 로고
    • Reputation-based service management and reward mechanisms in fednets to improve the quality of cooperation between personal networks. 2010 Fifth International Conference on Digital Telecommunications (ICDT)
    • Ibrohimovna M, Groot SH. Reputation-based service management and reward mechanisms in fednets to improve the quality of cooperation between personal networks. 2010 Fifth International Conference on Digital Telecommunications (ICDT) 2010; 98-103.
    • (2010) , pp. 98-103
    • Ibrohimovna, M.1    Groot, S.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.