메뉴 건너뛰기




Volumn 259, Issue PART B, 2014, Pages 571-577

Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol

Author keywords

Authentication; De synchronization attack; Privacy; Reader impersonation attack; RFID; Tag impersonation attack

Indexed keywords

ATTACK COMPLEXITY; DE-SYNCHRONIZATION ATTACKS; IMPERSONATION ATTACK; MUTUAL AUTHENTICATION; MUTUAL AUTHENTICATION PROTOCOLS; PASSIVE ATTACKS; PRIVACY PROTECTION; SECURE PROTOCOLS;

EID: 84889098244     PISSN: 03770427     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cam.2013.09.073     Document Type: Article
Times cited : (29)

References (24)
  • 1
    • 84865691370 scopus 로고    scopus 로고
    • Data fusion of multi-sensor for IOT precise measurement based on improved PSO algorithms
    • Wen-Tsai Sung, and Ming-Han Tsai Data fusion of multi-sensor for IOT precise measurement based on improved PSO algorithms Computers & Mathematics with Applications 64 5 2012 1450 1461
    • (2012) Computers & Mathematics with Applications , vol.64 , Issue.5 , pp. 1450-1461
    • Sung, W.-T.1    Tsai, M.-H.2
  • 2
    • 82955235534 scopus 로고    scopus 로고
    • A review of RFID technology and its managerial applications in different industries
    • Xiaowei Zhu, Samar K. Mukhopadhyay, and Hisashi Kurata A review of RFID technology and its managerial applications in different industries Journal of Engineering and Technology Management 29 1 2012 152 167
    • (2012) Journal of Engineering and Technology Management , vol.29 , Issue.1 , pp. 152-167
    • Zhu, X.1    Mukhopadhyay, S.K.2    Kurata, H.3
  • 3
    • 84865691619 scopus 로고    scopus 로고
    • Intelligent fault prediction system based on internet of things
    • Xiaoli Xu, Tao Chen, and Mamoru Minami Intelligent fault prediction system based on internet of things Computers & Mathematics with Applications 64 5 2012 833 839
    • (2012) Computers & Mathematics with Applications , vol.64 , Issue.5 , pp. 833-839
    • Xu, X.1    Chen, T.2    Minami, M.3
  • 4
    • 84855467564 scopus 로고    scopus 로고
    • ACSP: A novel security protocol against counting attack for UHF RFID systems
    • Zhuzhong Qian, Ce Chen, Ilsun You, and Sanglu Lu ACSP: a novel security protocol against counting attack for UHF RFID systems Computers & Mathematics with Applications 63 2 2012 492 500
    • (2012) Computers & Mathematics with Applications , vol.63 , Issue.2 , pp. 492-500
    • Qian, Z.1    Chen, C.2    You, I.3    Lu, S.4
  • 5
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • Chien Hung-Yu SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity IEEE Transactions on Dependable and Secure Computing 4 4 2007 337 340
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Hung-Yu, C.1
  • 6
    • 77953303552 scopus 로고    scopus 로고
    • Lightweight mutual authentication and ownership transfer for RFID systems
    • Lars Kulseng, Zhen Yu, Yawen Wei, Yong Guan, Lightweight mutual authentication and ownership transfer for RFID systems, in: Proceedings of IEEE INFOCOM 2010, pp. 1-5, 2010.
    • (2010) Proceedings of IEEE INFOCOM 2010 , pp. 1-5
    • Kulseng, L.1    Yu, Z.2    Wei, Y.3    Guan, Y.4
  • 7
    • 78751647681 scopus 로고    scopus 로고
    • The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
    • Yu-Yi Chen, Meng-Lin Tsai, and Jinn-Ke Jan The design of RFID access control protocol using the strategy of indefinite-index and challenge-response Computer Communications 34 3 2011 250 256
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 250-256
    • Chen, Y.-Y.1    Tsai, M.-L.2    Jan, J.-K.3
  • 8
    • 78751649779 scopus 로고    scopus 로고
    • Improvement of the RFID authentication scheme based on quadratic residues
    • Tzu-Chang Yeh, Chien-Hung Wu, and Yuh-Min Tseng Improvement of the RFID authentication scheme based on quadratic residues Computer Communications 34 3 2011 337 341
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 337-341
    • Yeh, T.-C.1    Wu, C.-H.2    Tseng, Y.-M.3
  • 9
    • 78751648506 scopus 로고    scopus 로고
    • Defending RFID authentication protocols against DoS attacks
    • Dang Nguyen Duc, and Kwangjo Kim Defending RFID authentication protocols against DoS attacks Computer Communications 34 3 2011 384 390
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 384-390
    • Duc, D.N.1    Kim, K.2
  • 10
    • 85008055668 scopus 로고    scopus 로고
    • Secure and serverless RFID authentication and search protocols
    • Chiu Chiang Tan, Bo Sheng, and Qun Li Secure and serverless RFID authentication and search protocols IEEE Transactions on Wireless Communications 7 4 2008 1400 1407
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1400-1407
    • Tan, C.C.1    Sheng, B.2    Li, Q.3
  • 14
    • 70450265312 scopus 로고    scopus 로고
    • Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI
    • Raphael C.-W. Phan Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI IEEE Transactions on Dependable and Secure Computing 6 4 2009 316 320
    • (2009) IEEE Transactions on Dependable and Secure Computing , vol.6 , Issue.4 , pp. 316-320
    • Phan, R.C.-W.1
  • 16
    • 58049161510 scopus 로고    scopus 로고
    • Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags
    • Vienna, Austria, September
    • Mihály Bárász, Balázs Boros, Péter Ligeti, Krisztina Lója, Dániel Nagy, Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags, in: First International EURASIP Workshop on RFID Technology, Vienna, Austria, September 2007.
    • (2007) First International EURASIP Workshop on RFID Technology
    • Mihály Bárász, B.1
  • 17
    • 84919847449 scopus 로고    scopus 로고
    • Consideration on the Brute-force Attack Cost and Retrieval Cost: A Hash-based radio-frequency identification (RFID) Tag Mutual Authentication Protocol
    • Jung-Sik Cho, Young-Sik Jeong, and Sang Oh Park Consideration on the Brute-force Attack Cost and Retrieval Cost: a Hash-based radio-frequency identification (RFID) Tag Mutual Authentication Protocol Computers & Mathematics with Applications 2012
    • (2012) Computers & Mathematics with Applications
    • Cho, J.-S.1    Jeong, Y.-S.2    Park, S.O.3
  • 18
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • Ari Juels RFID security and privacy: a research survey Selected Areas in Communications 24 2 2006 381 394 (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 19
    • 33847330246 scopus 로고    scopus 로고
    • A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks
    • Tassos Dimitriou, A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks, in: Proceedings of SecureComm'05, pp. 59-66, 2005.
    • (2005) Proceedings of SecureComm'05 , pp. 59-66
    • Dimitriou, T.1
  • 22
    • 84869783330 scopus 로고    scopus 로고
    • Desynchronization attack on hash-based RFID mutual authentication protocol
    • Hyunsung Kim Desynchronization attack on hash-based RFID mutual authentication protocol Journal of Security Engineering 9 4 2012 357 366
    • (2012) Journal of Security Engineering , vol.9 , Issue.4 , pp. 357-366
    • Kim, H.1
  • 23
    • 78751647847 scopus 로고    scopus 로고
    • Securing against Brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • Jung-Sik Cho, Sang-Soo Yeo, and Sung Kwon Kim Securing against Brute-force attack: a hash-based RFID mutual authentication protocol using a secret value Computer Communications 34 3 2011 391 397
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 391-397
    • Cho, J.-S.1    Yeo, S.-S.2    Kim, S.K.3
  • 24
    • 84869754446 scopus 로고    scopus 로고
    • Enhanced hash-based RFID mutual authentication protocol
    • Communications in Computer and Information Science
    • Hyunsung Kim Enhanced hash-based RFID mutual authentication protocol Computer Applications for Security, Control and System Engineering Communications in Computer and Information Science vol. 339 2012 70 77
    • (2012) Computer Applications for Security, Control and System Engineering , vol.339 VOL. , pp. 70-77
    • Kim, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.