메뉴 건너뛰기




Volumn 70, Issue 1, 2014, Pages 75-94

An efficient mutual authentication RFID scheme based on elliptic curve cryptography

Author keywords

ECDLP; Forward privacy; Location privacy; Mutual authentication; RFID; Untraceable privacy

Indexed keywords

ADVANCED TRAFFIC MANAGEMENT SYSTEMS; AUTHENTICATION; DATA PRIVACY; GEOMETRY; INVENTORY CONTROL; PUBLIC KEY CRYPTOGRAPHY; SCALABILITY; SUPPLY CHAIN MANAGEMENT;

EID: 84907591223     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-013-1073-x     Document Type: Article
Times cited : (75)

References (68)
  • 1
    • 67349277179 scopus 로고    scopus 로고
    • PAP: A privacy and authentication protocol for passive RFID tags
    • Liu AX, Bailey LA (2009) PAP: a privacy and authentication protocol for passive RFID tags. Comput Commun 32(7):1194-1199
    • (2009) Comput Commun , vol.32 , Issue.7 , pp. 1194-1199
    • Liu, A.X.1    Bailey, L.A.2
  • 2
    • 84907591029 scopus 로고    scopus 로고
    • EasyCard. http://www.easycard.com.tw/
    • EasyCard1
  • 3
    • 77956872484 scopus 로고    scopus 로고
    • REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks
    • Lin X, Lu R, Kwan D, Shen XS (2010) REACT: an RFID-based privacy-preserving children tracking scheme for large amusement parks. Comput Netw 54(15):2744-2755
    • (2010) Comput Netw , vol.54 , Issue.15 , pp. 2744-2755
    • Lin, X.1    Lu, R.2    Kwan, D.3    Shen, X.S.4
  • 4
    • 53749094694 scopus 로고    scopus 로고
    • Public key cryptography based privacy preserving multi-context RFID infrastructure
    • Kaya SV, Sava E, Levi A, Erçetin Ö (2009) Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Netw 7(1):136-152
    • (2009) Ad Hoc Netw , vol.7 , Issue.1 , pp. 136-152
    • Kaya, S.V.1    Sava, E.2    Levi, A.3    Erçetin Ö.4
  • 5
    • 64249137046 scopus 로고    scopus 로고
    • A hybrid approach for privacy-preserving RFID tags
    • Ryu EK, Takagi T (2009) A hybrid approach for privacy-preserving RFID tags. Comput Stand Interfaces 31(4):812-815
    • (2009) Comput Stand Interfaces , vol.31 , Issue.4 , pp. 812-815
    • Ryu, E.K.1    Takagi, T.2
  • 6
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • Cho JS, Yeo SS, Kim SK (2011) Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput Commun 34(3):391-397
    • (2011) Comput Commun , vol.34 , Issue.3 , pp. 391-397
    • Cho, J.S.1    Yeo, S.S.2    Kim, S.K.3
  • 9
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Springer, Berlin
    • Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Security in pervasive computing. Springer, Berlin, pp 201-212
    • (2004) Security in Pervasive Computing , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 10
    • 78751649779 scopus 로고    scopus 로고
    • Improvement of the RFID authentication scheme based on quadratic residues
    • Yeh TC, Wu CH, Tseng YM (2011) Improvement of the RFID authentication scheme based on quadratic residues. Comput Commun 34(3):337-341
    • (2011) Comput Commun , vol.34 , Issue.3 , pp. 337-341
    • Yeh, T.C.1    Wu, C.H.2    Tseng, Y.M.3
  • 18
    • 80053220372 scopus 로고    scopus 로고
    • Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems
    • 2865742
    • Ning H, Liu H, Mao J, Zhang Y (2011) Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Commun 5(12):1755-1768
    • (2011) IET Commun , vol.5 , Issue.12 , pp. 1755-1768
    • Ning, H.1    Liu, H.2    Mao, J.3    Zhang, Y.4
  • 20
    • 34548815120 scopus 로고    scopus 로고
    • Are standards compliant elliptic curve cryptosystems feasible on RFID
    • Kumar S, Paar C (2006) Are standards compliant elliptic curve cryptosystems feasible on RFID. In: Workshop on RFID security, pp 12-14
    • (2006) Workshop on RFID Security , pp. 12-14
    • Kumar, S.1    Paar, C.2
  • 27
    • 75649122972 scopus 로고    scopus 로고
    • Low-cost digital signature architecture suitable for radio frequency identification tags
    • O'Neill M, Robshaw MJ (2010) Low-cost digital signature architecture suitable for radio frequency identification tags. Comput Digital Tech IET 4(1):14-26
    • (2010) Comput Digital Tech IET , vol.4 , Issue.1 , pp. 14-26
    • O'Neill, M.1    Robshaw, M.J.2
  • 30
    • 80455155201 scopus 로고    scopus 로고
    • Zero-knowledge authentication protocol based on alternative mode in RFID systems
    • 2865742
    • Liu H, Ning H (2011) Zero-knowledge authentication protocol based on alternative mode in RFID systems. IEEE Sensors J 11(12):3235-3245
    • (2011) IEEE Sensors J , vol.11 , Issue.12 , pp. 3235-3245
    • Liu, H.1    Ning, H.2
  • 33
  • 36
    • 37349114566 scopus 로고    scopus 로고
    • E-passport threats
    • Vaudenay S (2007) E-passport threats. IEEE Secur Privacy 5(6):61-64
    • (2007) IEEE Secur Privacy , vol.5 , Issue.6 , pp. 61-64
    • Vaudenay, S.1
  • 39
    • 57049150751 scopus 로고    scopus 로고
    • A study on secure RFID mutual authentication scheme in pervasive computing environment
    • Kang SY, Lee DG, Lee IY (2008) A study on secure RFID mutual authentication scheme in pervasive computing environment. Comput Commun 31(18):4248-4254
    • (2008) Comput Commun , vol.31 , Issue.18 , pp. 4248-4254
    • Kang, S.Y.1    Lee, D.G.2    Lee, I.Y.3
  • 40
    • 84863515660 scopus 로고    scopus 로고
    • Scalable RFID systems: A privacy-preserving protocol with constant-time identification
    • Alomair B, Clark A, Cuellar J, Poovendran R (2012) Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans Parallel Distrib Syst 23(8):1536-1550
    • (2012) IEEE Trans Parallel Distrib Syst , vol.23 , Issue.8 , pp. 1536-1550
    • Alomair, B.1    Clark, A.2    Cuellar, J.3    Poovendran, R.4
  • 41
    • 78049383154 scopus 로고    scopus 로고
    • Privacy versus scalability in radio frequency identification systems
    • Alomair B, Poovendran R (2010) Privacy versus scalability in radio frequency identification systems. Comput Commun 33(18):2155-2163
    • (2010) Comput Commun , vol.33 , Issue.18 , pp. 2155-2163
    • Alomair, B.1    Poovendran, R.2
  • 42
    • 79151469014 scopus 로고    scopus 로고
    • Scalable RFID security protocols supporting tag ownership transfer
    • Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556-566
    • (2011) Comput Commun , vol.34 , Issue.4 , pp. 556-566
    • Song, B.1    Mitchell, C.J.2
  • 43
    • 84870065586 scopus 로고    scopus 로고
    • A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
    • Doss R, Sundaresan S, Zhou W (2012) A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw 1(1):383-396
    • (2012) Ad Hoc Netw , vol.1 , Issue.1 , pp. 383-396
    • Doss, R.1    Sundaresan, S.2    Zhou, W.3
  • 44
    • 84655161367 scopus 로고    scopus 로고
    • Secure authentication scheme for passive C1G2 RFID tags
    • Moessner M, Khan GN (2012) Secure authentication scheme for passive C1G2 RFID tags. Comput Netw 56(1):273-286
    • (2012) Comput Netw , vol.56 , Issue.1 , pp. 273-286
    • Moessner, M.1    Khan, G.N.2
  • 45
    • 84865741288 scopus 로고    scopus 로고
    • A minimum disclosure approach to authentication and privacy in RFID systems
    • Doss R, Zhou W, Sundaresan S, Yu S, Gao L (2012) A minimum disclosure approach to authentication and privacy in RFID systems. Comput Netw 56(15):3401-3416
    • (2012) Comput Netw , vol.56 , Issue.15 , pp. 3401-3416
    • Doss, R.1    Zhou, W.2    Sundaresan, S.3    Yu, S.4    Gao, L.5
  • 46
    • 78751648506 scopus 로고    scopus 로고
    • Defending RFID authentication protocols against DoS attacks
    • Duc DN, Kim K (2011) Defending RFID authentication protocols against DoS attacks. Comput Commun 34(3):384-390
    • (2011) Comput Commun , vol.34 , Issue.3 , pp. 384-390
    • Duc, D.N.1    Kim, K.2
  • 47
    • 84891359925 scopus 로고    scopus 로고
    • EPCglobal. http://www.epcglobalinc.org
    • EPCglobal
  • 50
    • 77957851534 scopus 로고    scopus 로고
    • Securing RFID systems conforming to EPC class 1 generation 2 standard
    • Yeh TC, Wang YJ, Kuo TC, Wang SS (2010) Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 37(12):7678-7683
    • (2010) Expert Syst Appl , vol.37 , Issue.12 , pp. 7678-7683
    • Yeh, T.C.1    Wang, Y.J.2    Kuo, T.C.3    Wang, S.S.4
  • 51
    • 81855161588 scopus 로고    scopus 로고
    • Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard
    • Yoon EJ (2012) Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 39(1):1589-1594
    • (2012) Expert Syst Appl , vol.39 , Issue.1 , pp. 1589-1594
    • Yoon, E.J.1
  • 52
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • 3227926
    • Chien HY (2007) SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337-340
    • (2007) IEEE Trans Depend Secure Comput , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.Y.1
  • 53
    • 70450265312 scopus 로고    scopus 로고
    • Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI
    • Phan RW (2009) Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI. IEEE Trans Depend Secure Comput 6(4):316-320
    • (2009) IEEE Trans Depend Secure Comput , vol.6 , Issue.4 , pp. 316-320
    • Phan, R.W.1
  • 55
    • 78751641225 scopus 로고    scopus 로고
    • On the security of Chien's ultralightweight RFID authentication protocol
    • Sun HM, Ting WC, Wang KH (2011) On the security of Chien's ultralightweight RFID authentication protocol. IEEE Trans Depend Secure Comput 8(2):315-317
    • (2011) IEEE Trans Depend Secure Comput , vol.8 , Issue.2 , pp. 315-317
    • Sun, H.M.1    Ting, W.C.2    Wang, K.H.3
  • 56
    • 79957590172 scopus 로고    scopus 로고
    • On ultralightweight RFID authentication protocols
    • D'Arco P, De Santis A (2011) On ultralightweight RFID authentication protocols. IEEE Trans Depend Secure Comput 8(4):548-563
    • (2011) IEEE Trans Depend Secure Comput , vol.8 , Issue.4 , pp. 548-563
    • D'Arco, P.1    De Santis, A.2
  • 57
    • 84862788058 scopus 로고    scopus 로고
    • A new ultralightweight RFID authentication protocol with permutation
    • Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702-705
    • (2012) IEEE Commun Lett , vol.16 , Issue.5 , pp. 702-705
    • Tian, Y.1    Chen, G.2    Li, J.3
  • 58
  • 63
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • Chen Y, Chou JS, Sun HM (2008) A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput Netw 52(12):2373-2380
    • (2008) Comput Netw , vol.52 , Issue.12 , pp. 2373-2380
    • Chen, Y.1    Chou, J.S.2    Sun, H.M.3
  • 64
    • 77949562527 scopus 로고    scopus 로고
    • Cryptanalysis of some RFID authentication protocols
    • Cao T, Shen P, Bertino E (2008) Cryptanalysis of some RFID authentication protocols. J Commun 3(7):20-27
    • (2008) J Commun , vol.3 , Issue.7 , pp. 20-27
    • Cao, T.1    Shen, P.2    Bertino, E.3
  • 66
    • 45749087762 scopus 로고    scopus 로고
    • Traceable privacy of recent provably-secure RFID protocols
    • Springer, Berlin
    • Ouafi K, Phan RCW (2008) Traceable privacy of recent provably-secure RFID protocols. In: Applied cryptography and network security. Springer, Berlin, pp 479-489
    • (2008) Applied Cryptography and Network Security , pp. 479-489
    • Ouafi, K.1    Rcw, P.2
  • 68
    • 84977783611 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • Springer, Berlin
    • Lim CH, Kwon T (2006) Strong and robust RFID authentication enabling perfect ownership transfer. In: Information and communications security. Springer, Berlin, pp 1-20
    • (2006) Information and Communications Security , pp. 1-20
    • Lim, C.H.1    Kwon, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.