메뉴 건너뛰기




Volumn 77, Issue 2, 2014, Pages 1019-1038

Simulation-based traceability analysis of RFID authentication protocols

Author keywords

Authentication protocol; Privacy models; RFID systems; Traceability

Indexed keywords

AUTHENTICATION; INTERNET OF THINGS;

EID: 84903597022     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-013-1552-7     Document Type: Article
Times cited : (19)

References (39)
  • 2
    • 34948883343 scopus 로고    scopus 로고
    • Ubiquitous computing in the real world: Lessons learnt from large scale RFID deployments
    • Konomi, S.; Roussos, G(2007)Ubiquitous computing in the real world: Lessons learnt from large scale RFID deploymentsPersonal and Ubiquitous Computing, 11(7), 507-521.
    • (2007) Personal and Ubiquitous Computing , vol.11 , Issue.7 , pp. 507-521
    • Konomi, S.1    Roussos, G.2
  • 4
    • 84875116626 scopus 로고    scopus 로고
    • Pathchecker: An RFID application for tracing products in supply-chains
    • Ouafi, K.; Vaudenay, S(2009)Pathchecker: An RFID application for tracing products in supply-chainsIn RFIDsec.
    • (2009) RFIDsec
    • Ouafi, K.1    Vaudenay, S.2
  • 9
    • 78751648506 scopus 로고    scopus 로고
    • Defending RFID authentication protocols against DoS attacks
    • 10.1016/j.comcom.2010.06.014
    • Duc, DN.; Kim, K(2011)Defending RFID authentication protocols against DoS attacksJournal of Computer Communications, 34, 384-390.
    • (2011) Journal of Computer Communications , vol.34 , pp. 384-390
    • Duc, D.N.1    Kim, K.2
  • 10
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • 10.1016/j.comcom.2010.02.029
    • Cho, J.-S.; Yeo, S.-S.; Kim, SK(2011)Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret valueJournal of Computer Communications, 34, 391-397.
    • (2011) Journal of Computer Communications , vol.34 , pp. 391-397
    • Cho, J.-S.1    Yeo, S.-S.2    Kim, S.K.3
  • 14
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial model for radio frequency identification
    • Avoine, G(2005)Adversarial model for radio frequency identificationCryptology ePrint archive, report 2005/049http://eprint.iacr.org/ 2005/049.
    • (2005) Cryptology EPrint Archive, Report 2005/049
    • Avoine, G.1
  • 16
    • 33745621564 scopus 로고    scopus 로고
    • Reducing time complexity in RFID systems
    • BPreneel & STavares (Eds.) Heidelberg: Springer
    • Avoine, G.; Dysli, E.; Oechslin, P(2006)Reducing time complexity in RFID systemsIn BPreneel & STavares (Eds.), SAC 2005LNCS (Vol3897, pp291-306)Heidelberg: Springer.
    • (2006) SAC 2005LNCS , vol.3897 , pp. 291-306
    • Avoine, G.1    Dysli, E.2    Oechslin, P.3
  • 19
    • 41549161615 scopus 로고    scopus 로고
    • Privacy of recent RFID authentication protocols
    • LChen, YMu, & WSusilo (Eds.) Heidelberg: Springer
    • Ouafi, K.; Phan, RC.-W(2008)Privacy of recent RFID authentication protocolsIn LChen, YMu, & WSusilo (Eds.), ISPEC 2008LNCS (Vol4991, pp263-277)Heidelberg: Springer.
    • (2008) ISPEC 2008LNCS , vol.4991 , pp. 263-277
    • Ouafi, K.1    Phan, C.R.-W.2
  • 20
    • 45749087762 scopus 로고    scopus 로고
    • Traceable privacy of recent provably-secure RFID Protocols
    • SMBellovin, et al(Eds.) Berlin, Heidelberg: Springer
    • Ouafi, K.; Phan, RC.-W(2008)Traceable privacy of recent provably-secure RFID ProtocolsIn SMBellovin, et al(Eds.), ACNS 2008LNCS (Vol5037, pp479-489)Berlin, Heidelberg: Springer.
    • (2008) ACNS 2008LNCS , vol.5037 , pp. 479-489
    • Ouafi, K.1    Phan, C.R.-W.2
  • 23
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • KKurosawa (Ed.) Heidelberg: Springer
    • Vaudenay, S(2007)On privacy models for RFIDIn KKurosawa (Ed.), ASIACRYPT 2007LNCS (Vol4833, pp68-87)Heidelberg: Springer.
    • (2007) ASIACRYPT 2007LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 25
    • 84856207915 scopus 로고    scopus 로고
    • Mutual authentication protocol for networked RFID systems
    • Fernando, H.; Abawajy, J(2011)Mutual authentication protocol for networked RFID systemsIn IEEE TrustComm.
    • (2011) IEEE TrustComm
    • Fernando, H.1    Abawajy, J.2
  • 27
    • 84858411508 scopus 로고    scopus 로고
    • A lightweight privacy-preserving mutual authentication protocol for RFID systems
    • Fan, X.; Gong, G.; Engels, DW& Smith, EM(2011)A lightweight privacy-preserving mutual authentication protocol for RFID systemsIn IEEE GLOBECOM workshops (GC Wkshps) (pp1083-1087).
    • (2011) IEEE GLOBECOM Workshops (GC Wkshps) , pp. 1083-1087
    • Fan, X.1    Gong, G.2    Engels, D.W.3    Smith, E.M.4
  • 30
    • 70350383766 scopus 로고    scopus 로고
    • New privacy results on synchronized RFID authentication protocols against tag tracing
    • MBackes & PNing (Eds.) Heidelberg: Springer
    • Ng, CY.; Susilo, W.; Mu, Y.; Safavi-Naini, R(2009)New privacy results on synchronized RFID authentication protocols against tag tracingIn MBackes & PNing (Eds.), ESORICS 2009LNCS (Vol5789, pp321-336)Heidelberg: Springer.
    • (2009) ESORICS 2009LNCS , vol.5789 , pp. 321-336
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 33
    • 84903608391 scopus 로고    scopus 로고
    • Two RFID privacy models in front of a court
    • Habibi, MH.; Aref, MR(2011) Two RFID privacy models in front of a courtEprint IACR archivehttp://eprint.iacr.org/2011/625.
    • (2011) Eprint IACR Archive
    • Habibi, M.H.1    Aref, M.R.2
  • 35
    • 78650076689 scopus 로고    scopus 로고
    • Time measurement threatens privacy-friendly RFID authentication protocols
    • Sprinfer LNCS
    • Avoine, G.; Coisel, I.; Martin, T(2010)Time measurement threatens privacy-friendly RFID authentication protocolsIn RFIDSecSprinfer LNCS (Vol6370, pp138-157).
    • (2010) RFIDSec , vol.6370 , pp. 138-157
    • Avoine, G.1    Coisel, I.2    Martin, T.3
  • 37
    • 80054073000 scopus 로고    scopus 로고
    • Extending an RFID security and privacy model by considering forward untraceability
    • Akgün, M.; Çaǧlayan, M(2011)Extending an RFID security and privacy model by considering forward untraceabilitySecurity and trust management LNCS, (Vol6710, pp239-254).
    • (2011) Security and Trust Management LNCS , vol.6710 , pp. 239-254
    • Akgün, M.1    Çaǧlayan, M.2
  • 38
    • 73149105959 scopus 로고    scopus 로고
    • An enhanced 2-pass optimistic anonymous RFID authentication protocol with forward security
    • He, L.; Jin, S.; Zhang, T.; Li, N(2009)An enhanced 2-pass optimistic anonymous RFID authentication protocol with forward securityIn WiCOM (pp1-4).
    • (2009) WiCOM , pp. 1-4
    • He, L.1    Jin, S.2    Zhang, T.3    Li, N.4
  • 39
    • 84864194805 scopus 로고    scopus 로고
    • The Hummingbird-2 lightweight authenticated encryption algorithm
    • Engels, D.; Saarinen, M.-JO.; Smith, EM(2011)The Hummingbird-2 lightweight authenticated encryption algorithmIn RFIDSec 2011.
    • (2011) RFIDSec 2011
    • Engels, D.1    Saarinen, J.M.O.2    Smith, E.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.