메뉴 건너뛰기




Volumn 18, Issue , 2014, Pages 133-146

A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol

Author keywords

Elliptic curve cryptosystem (ECC); ID verifier; Internet of Things (IoT); Public key cryptographic (PKC); RFID

Indexed keywords

ALGORITHMS; AUTHENTICATION; CRYPTOGRAPHY; INFORMATION TECHNOLOGY; INTERNET;

EID: 84899644274     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2013.02.004     Document Type: Article
Times cited : (175)

References (60)
  • 1
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • M. Weiser, The computer for the 21st century, Sci. Am. (1991) 94-100.
    • (1991) Sci. Am. , pp. 94-100
    • Weiser, M.1
  • 3
    • 58649098157 scopus 로고    scopus 로고
    • RFID in pervasive computing: State-of-theart and outlook
    • G. Roussos, V. Kostakos, RFID in pervasive computing: state-of-theart and outlook, Pervasive Mob. Comput. 5 (2009) 110-131. http://dx.doi.org/10.1016/j. pmcj.2008.11.004.
    • (2009) Pervasive Mob. Comput. , vol.5 , pp. 110-131
    • Roussos, G.1    Kostakos, V.2
  • 6
    • 70449657680 scopus 로고    scopus 로고
    • Energy-aware simulation for wireless sensor networks
    • Rome, Italy
    • G. Merrett, N. White, N. Harris, B. Al-Hashimi, Energy-aware simulation for wireless sensor networks, in: Proc. IEEE SECON, Rome, Italy, 2009, pp. 64-71.
    • (2009) Proc. IEEE SECON , pp. 64-71
    • Merrett, G.1    White, N.2    Harris, N.3    Al-Hashimi, B.4
  • 8
    • 17144395505 scopus 로고    scopus 로고
    • Computing and communicating functions over sensor networks
    • A. Giridhar, P.R. Kumar, Computing and communicating functions over sensor networks, IEEE JSAC 23 (4) (2005) 755-764.
    • (2005) IEEE JSAC , vol.23 , Issue.4 , pp. 755-764
    • Giridhar, A.1    Kumar, P.R.2
  • 10
    • 0032178265 scopus 로고    scopus 로고
    • Modeling TCP throughput: A simple model and its empirical validation
    • Vancouver, CA
    • J. Padhye, V. Firoiu, D. Towsley, J. Kurose, Modeling TCP throughput: a simple model and its empirical validation, in: Proc. ACM SIGCOMM, Vancouver, CA, 1998, pp. 303-314.
    • (1998) Proc. ACM SIGCOMM , pp. 303-314
    • Padhye, J.1    Firoiu, V.2    Towsley, D.3    Kurose, J.4
  • 11
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of things: A survey
    • L. Atzori, A. Iera, G. Morabito, The Internet of things: a survey, Comput. Netw. 54 (15) (2010) 2787-2805.
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 12
    • 84899632057 scopus 로고    scopus 로고
    • The Internet of Things, ITU Internet Reports
    • The Internet of Things, ITU Internet Reports, 2005. .
    • (2005)
  • 13
    • 84899629179 scopus 로고    scopus 로고
    • EPCglobal. Specification for RFID Air Interface
    • EPCglobal. Specification for RFID Air Interface. .
  • 14
    • 84861997111 scopus 로고    scopus 로고
    • Internet of things: Vision, applications and research challenges
    • Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, Imrich Chlamtac, Internet of things: vision, applications and research challenges, Ad Hoc Network, 10, 2012, 1497-1516.
    • (2012) Ad Hoc Network , vol.10 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 17
    • 17044439481 scopus 로고    scopus 로고
    • Battery-free wireless identification and sensing
    • M. Philipose et al., Battery-free wireless identification and sensing, IEEE Pervasive Comput. 4 (1) (2005) 37-45.
    • (2005) IEEE Pervasive Comput. , vol.4 , Issue.1 , pp. 37-45
    • Philipose, M.1
  • 18
    • 57449101619 scopus 로고    scopus 로고
    • Taxonomy and challenges of the integration of RFID and wireless sensor networks
    • H. Liu, M. Bolic, A. Nayak, I. Stojmenovic, Taxonomy and challenges of the integration of RFID and wireless sensor networks, IEEE Netw. 22 (2008) 26-35.
    • (2008) IEEE Netw. , vol.22 , pp. 26-35
    • Liu, H.1    Bolic, M.2    Nayak, A.3    Stojmenovic, I.4
  • 19
    • 38649088890 scopus 로고    scopus 로고
    • Integration of RFID into wireless sensor networks: Architectures, opportunities and challenging problems
    • L. Zhang, Z. Wang, Integration of RFID into wireless sensor networks: architectures, opportunities and challenging problems, in: Proc. GCCW, 2006, pp. 463-469.
    • (2006) Proc. GCCW , pp. 463-469
    • Zhang, L.1    Wang, Z.2
  • 20
    • 34247154004 scopus 로고    scopus 로고
    • Wireless industrial monitoring and control using a smart sensor platform
    • H. Ramamurthy et al., Wireless industrial monitoring and control using a smart sensor platform, IEEE Sensor 7 (5) (2007) 611-618.
    • (2007) IEEE Sensor , vol.7 , Issue.5 , pp. 611-618
    • Ramamurthy, H.1
  • 21
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • H.Y. Chien, C.H. Chen, Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards, Comput. Stand. Interfaces 29 (2) (2007) 254-259.
    • (2007) Comput. Stand. Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 24
    • 77957851534 scopus 로고    scopus 로고
    • Securing RFID systems conforming to EPC Class 1 Generation 2 standard
    • T. Yeh, Y. Wanga, T. Kuo, S. Wang, Securing RFID systems conforming to EPC Class 1 Generation 2 standard, Exp. Syst. Appl. 37 (2010) 7678-7683.
    • (2010) Exp. Syst. Appl. , vol.37 , pp. 7678-7683
    • Yeh, T.1    Wanga, Y.2    Kuo, T.3    Wang, S.4
  • 25
    • 77952285870 scopus 로고    scopus 로고
    • Security of ultra-lightweight RFID authentication protocols and its improvements
    • H.Y. Chien, C.W. Huang, Security of ultra-lightweight RFID authentication protocols and its improvements, ACM Oper. Syst. Rev. 41 (2) (2007) 83-86.
    • (2007) ACM Oper. Syst. Rev. , vol.41 , Issue.2 , pp. 83-86
    • Chien, H.Y.1    Huang, C.W.2
  • 30
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • H.Y. Chien, SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity, IEEE Trans. Dependable Secure Comput. 4 (4) (2007) 337-340.
    • (2007) IEEE Trans. Dependable Secure Comput. , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.Y.1
  • 33
    • 41549156956 scopus 로고    scopus 로고
    • A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
    • Jihwan Lim, Heekuck Oh, SangJin Kim, A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection, ISPEC, LNCS 4991 (2008) (2008) 278-289.
    • (2008) ISPEC, LNCS , vol.4991 , pp. 278-289
    • Lim, J.1    Oh, H.2    Kim, S.3
  • 34
    • 67349277179 scopus 로고    scopus 로고
    • A privacy and authentication protocol for passive RFID tags
    • Alex X. Liu, LeRoy A. Bailey, A privacy and authentication protocol for passive RFID tags, Comput. Commun. 32 (2009) 1194-1199.
    • (2009) Comput. Commun. , vol.32 , pp. 1194-1199
    • Liu, A.X.1    Bailey, L.A.2
  • 35
    • 57049150751 scopus 로고    scopus 로고
    • A study on secure RFID mutual authentication scheme in pervasive
    • S.Y. Kang, D.G. Lee, I.Y. Lee, A study on secure RFID mutual authentication scheme in pervasive, Comput. Commun. 31 (2008) 4248-4254.
    • (2008) Comput. Commun. , vol.31 , pp. 4248-4254
    • Kang, S.Y.1    Lee, D.G.2    Lee, I.Y.3
  • 36
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • J.S. Cho, S.S. Yeo, S.K. Kim, Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value, Comput. Commun. 34 (2011) 391-397.
    • (2011) Comput. Commun. , vol.34 , pp. 391-397
    • Cho, J.S.1    Yeo, S.S.2    Kim, S.K.3
  • 40
    • 53749094694 scopus 로고    scopus 로고
    • Public key cryptography based privacy preserving multi-context RFID infrastructure
    • S.V. Kaya, E. Savas, A. Levi, Ö. Erçetin, Public key cryptography based privacy preserving multi-context RFID infrastructure, Ad Hoc Netw. 7 (2009) 136-152.
    • (2009) Ad Hoc Netw. , vol.7 , pp. 136-152
    • Kaya, S.V.1    Savas, E.2    Levi, A.3    Erçetin, Ö.4
  • 41
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, Elliptic curve cryptosystems, Math. Comput. 48 (1987) 203-209.
    • (1987) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 47
    • 84899645216 scopus 로고    scopus 로고
    • RFID Journal. News Article, February 24, 2006 (04.05.06).
    • RFID Journal (2006), EPC Tags Subject to Phone Attacks. News Article, February 24, 2006. (04.05.06).
    • (2006) EPC Tags Subject to Phone Attacks
  • 48
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues
    • Y. Chen, J.S. Chou, H.M. Sun, A novel mutual authentication scheme based on quadratic residues, Comput. Netw. 52 (2008) 2373-2380.
    • (2008) Comput. Netw. , vol.52 , pp. 2373-2380
    • Chen, Y.1    Chou, J.S.2    Sun, H.M.3
  • 49
    • 77949562527 scopus 로고    scopus 로고
    • Cryptanalysis of some RFID authentication protocols
    • T. Cao, P. Shen, Cryptanalysis of some RFID authentication protocols, J. Commun. 3 (7) (2008).
    • (2008) J. Commun. , vol.3 , Issue.7
    • Cao, T.1    Shen, P.2
  • 50
    • 78751649779 scopus 로고    scopus 로고
    • Improvement of the RFID authentication scheme based on quadratic residues
    • T.C. Yeh, C.H. Wua, Y.M. Tseng, Improvement of the RFID authentication scheme based on quadratic residues, Comput. Commun. 34 (2011) 337-341.
    • (2011) Comput. Commun. , vol.34 , pp. 337-341
    • Yeh, T.C.1    Wua, C.H.2    Tseng, Y.M.3
  • 51
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • in: Gilles Brassard (Ed.), , Springer-Verlag
    • C.P. Schnorr, Efficient identification and signatures for smart cards, in: Gilles Brassard (Ed.), Advances in Cryptology -CRYPTO'89, Lecture Notes in Computer Science, 435, Springer-Verlag, 1989, pp. 239-252.
    • (1989) Advances in Cryptology -CRYPTO'89, Lecture Notes in Computer Science , vol.435 , pp. 239-252
    • Schnorr, C.P.1
  • 52
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • in: E.F. Brickell (Ed.), , Springer-Verlag
    • T. Okamoto, Provably secure and practical identification schemes and corresponding signature schemes, in: E.F. Brickell (Ed.), Advances in Cryptology -CRYPTO'92, Lecture Notes in Computer Science, 740, Springer-Verlag, 1992, pp. 31-53.
    • (1992) Advances in Cryptology -CRYPTO'92, Lecture Notes in Computer Science , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 53
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP based randomized access control): Provably secure rfid authentication protocol
    • Y.K. Lee, L. Batina, I. Verbauwhede, EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol, IEEE International Conference on RFID, 2008, pp. 97-104.
    • (2008) IEEE International Conference on RFID , pp. 97-104
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 55
    • 33745654539 scopus 로고    scopus 로고
    • RFID-tags for anti-counterfeiting
    • P. Tuyls, L. Batina, RFID-tags for anti-counterfeiting, Lect. Notes Comput. Sci. 3860 (2006) 115-131.
    • (2006) Lect. Notes Comput. Sci. , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.