메뉴 건너뛰기




Volumn 67, Issue , 2014, Pages 89-103

Scalable RFID security framework and protocol supporting Internet of Things

Author keywords

Authentication; Internet of Things; Malware; RFID; Security framework; Security protocol

Indexed keywords

AUTHENTICATION; COMPUTER CRIME; INTERNET; INTERNET PROTOCOLS; SCALABILITY;

EID: 84899065536     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2014.03.023     Document Type: Article
Times cited : (56)

References (36)
  • 1
    • 80955160447 scopus 로고    scopus 로고
    • That 'Internet of Things' thing
    • (retrieved 08.04.11)
    • Kevin Ashton That 'Internet of Things' thing RFID J. 22 July 2009 < http://www.rfidjournal.com/article/view/4986 > (retrieved 08.04.11)
    • (2009) RFID J. , Issue.22 JULY
    • Ashton, K.1
  • 2
    • 84883738042 scopus 로고    scopus 로고
    • Security assessment of EPCglobal architecture framework
    • Divyan M. Konidala, W.-S. Kim, and K. Kim Security assessment of EPCglobal architecture framework AUTO-ID Labs 2006 13 16
    • (2006) RFID J. , pp. 13-16
    • Konidala, D.M.1    Kim, W.-S.2    Kim, K.3
  • 3
    • 80052496445 scopus 로고    scopus 로고
    • Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers
    • Rolando Trujillo-Rasua, and Agusti Solanas Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers Comput. Netw. 55 15 2011 3211 3223
    • (2011) Comput. Netw. , vol.55 , Issue.15 , pp. 3211-3223
    • Trujillo-Rasua, R.1    Solanas, A.2
  • 5
    • 79151469014 scopus 로고    scopus 로고
    • Scalable RFID security protocols supporting tag ownership transfer
    • B. Song, and C.J. Mitchell Scalable RFID security protocols supporting tag ownership transfer Comput. Commun. 34 4 2011 556 566
    • (2011) Comput. Commun. , vol.34 , Issue.4 , pp. 556-566
    • Song, B.1    Mitchell, C.J.2
  • 6
    • 84860888306 scopus 로고    scopus 로고
    • Security flaws in a recent RFID delegation protocol
    • (11)
    • I. Erguler, and E. Anarim Security flaws in a recent RFID delegation protocol Personal Ubiquitous Comput. 16 3 2012 337 349 (11)
    • (2012) Personal Ubiquitous Comput. , vol.16 , Issue.3 , pp. 337-349
    • Erguler, I.1    Anarim, E.2
  • 7
    • 84862295856 scopus 로고    scopus 로고
    • Predictive protocol for the scalable identification of RFID tags through collaborative readers
    • Rolando Trujillo-Rasua, Agusti Solanas, Pablo A. Pérez- Martínez, and Josep Domingo-Ferre Predictive protocol for the scalable identification of RFID tags through collaborative readers Comput. Ind. 63 6 2012 557 573
    • (2012) Comput. Ind. , vol.63 , Issue.6 , pp. 557-573
    • Trujillo-Rasua, R.1    Solanas, A.2    Pérez-Martínez, P.A.3    Domingo-Ferre, J.4
  • 9
    • 84899109808 scopus 로고    scopus 로고
    • EPCglobal. (retrieved 12.04.12)
    • EPCglobal. < http://www.gs1.org/gsmp/kc/epcglobal > (retrieved 12.04.12).
  • 10
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • V. Atluri, B. Pfitzmann, P.D. McDaniel (Eds.) ACM. Washington, DC, USA, ACM Press
    • D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: V. Atluri, B. Pfitzmann, P.D. McDaniel (Eds.), Conference on Computer and Communications Security - ACM CCS'04, ACM. Washington, DC, USA, ACM Press, 2004, pp. 210-219.
    • (2004) Conference on Computer and Communications Security - ACM CCS'04 , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 11
    • 70249136217 scopus 로고    scopus 로고
    • Scalable privacy protecting scheme through distributed rfid tag identification
    • ser. AIPACa '08, ACM, New York, NY, USA
    • S. Fouladgar, H. Afifi, Scalable privacy protecting scheme through distributed rfid tag identification, in: Proceedings of the Workshop on Applications of Private and Anonymous Communications, ser. AIPACa '08, ACM, New York, NY, USA, 2008, pp. 31-38. < http://doi.acm.org/10.1145/1461464.1461467 >.
    • (2008) Proceedings of the Workshop on Applications of Private and Anonymous Communications , pp. 31-38
    • Fouladgar, S.1    Afifi, H.2
  • 12
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • Security
    • Dirk Henrici, Paul MÄuller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: IEEE International Workshop on Pervasive Computing and Communication, Security, 2004, pp. 149-153.
    • (2004) IEEE International Workshop on Pervasive Computing and Communication , pp. 149-153
    • Dirk Henrici, P.1
  • 13
    • 51349094869 scopus 로고    scopus 로고
    • Recovering and restoring tampered RFID data using steganographic principles
    • 2006, ICIT 2006
    • M. Mohan, V. Potdar, E. Chang, Recovering and restoring tampered RFID data using steganographic principles, in: IEEE International Conference on Industrial Technology, 2006, ICIT 2006, 2006, pp. 2853-2859.
    • (2006) IEEE International Conference on Industrial Technology , pp. 2853-2859
    • Mohan, M.1    Potdar, V.2    Chang, E.3
  • 15
    • 34247465966 scopus 로고    scopus 로고
    • A distributed architecture for scalable private RFID tag identification
    • A. Solanas, J. Domingo-Ferrer, A. Martínez-Ballesté, and V. Daza A distributed architecture for scalable private RFID tag identification Comput. Netw. 51 9 2007 2268 2279
    • (2007) Comput. Netw. , vol.51 , Issue.9 , pp. 2268-2279
    • Solanas, A.1    Domingo-Ferrer, J.2    Martínez-Ballesté, A.3    Daza, V.4
  • 16
    • 82155182017 scopus 로고    scopus 로고
    • Scalable trajectory-based protocol for RFID tags identification
    • Rolando Trujillo-Rasua, and Agusti Solanas Scalable trajectory-based protocol for RFID tags identification RFID-TA 2011 2011 279 285
    • (2011) RFID-TA , vol.2011 , pp. 279-285
    • Trujillo-Rasua, R.1    Solanas, A.2
  • 17
    • 33947515842 scopus 로고    scopus 로고
    • Reducing time complexity in RFID systems
    • Gildas Avoine, Etienne Dysli, and Philippe Oechslin Reducing time complexity in RFID systems Sel. Areas Cryptogr. 2005 2005 291 306
    • (2005) Sel. Areas Cryptogr. , vol.2005 , pp. 291-306
    • Avoine, G.1    Dysli, E.2    Oechslin, P.3
  • 24
    • 84872677398 scopus 로고    scopus 로고
    • SQLIA detection and prevention approach for RFID systems
    • J. Abawajy SQLIA detection and prevention approach for RFID systems J. Syst. Softw. 86 3 2013 751 758
    • (2013) J. Syst. Softw. , vol.86 , Issue.3 , pp. 751-758
    • Abawajy, J.1
  • 26
    • 84899058411 scopus 로고    scopus 로고
    • The Internet Engineering Task Force (IETF), RFC2244, (retrieved 08.04.12)
    • The Internet Engineering Task Force (IETF), RFC2244, < http://tools.ietf.org/html/rfc2244#section-1.2 > (retrieved 08.04.12).
  • 27
    • 3843081053 scopus 로고    scopus 로고
    • A statistical test suite for random and pseudorandom number generators
    • A. Rukhin, and J. Soto et al. A statistical test suite for random and pseudorandom number generators NIST Spec. Publ. 2000 800 822
    • (2000) NIST Spec. Publ. , pp. 800-822
    • Rukhin, A.1    Soto, J.2
  • 32
    • 84899076722 scopus 로고    scopus 로고
    • National Institute of Standard and Technology. (retrieved 07.03.11)
    • National Institute of Standard and Technology. < http://csrc.nist.gov/ groups/ST/toolkit/rng/documentation-software.html > (retrieved 07.03.11).
  • 35
    • 84899064479 scopus 로고    scopus 로고
    • University of Washington's Lahar Project. (retrieved 08.04.11)
    • University of Washington's Lahar Project. < http://lahar.cs. washington.edu/displayPage.php?path=./content/Download/RFIDData/rfidData.html > (retrieved 08.04.11).
  • 36
    • 84899107900 scopus 로고    scopus 로고
    • EPC Global. (retrieved 20.11.12)
    • EPC Global. < http://www.gs1.org/gsmp/kc/epcglobal/tds/tds-1-6- RatifiedStd-20110922.pdf > (retrieved 20.11.12).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.