메뉴 건너뛰기




Volumn 57, Issue 3, 2014, Pages 239-246

A practical RFID authentication mechanism for digital television

Author keywords

Digital television (DTV); Impersonation attack; Radio frequency identification (RFID); Replay attack; Security; Smart card cloning

Indexed keywords

CLONE CELLS; CLONING; CRYPTOGRAPHY; DIGITAL RADIO; DIGITAL TELEVISION; RADIO WAVES; SMART CARDS; TELEVISION BROADCASTING;

EID: 84911004693     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-013-9844-5     Document Type: Article
Times cited : (7)

References (42)
  • 1
    • 78751647681 scopus 로고    scopus 로고
    • The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
    • Chen, Y. Y., Tsai, M. L., & Jan, J. K. (2011). The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. Computer Communications, 34(3), 250–256.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 250-256
    • Chen, Y.Y.1    Tsai, M.L.2    Jan, J.K.3
  • 3
    • 36248982045 scopus 로고    scopus 로고
    • SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • Chien, H. Y. (2007). SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(3), 337–340.
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.3 , pp. 337-340
    • Chien, H.Y.1
  • 4
    • 33751546328 scopus 로고    scopus 로고
    • Mutual-authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • Chien, H. Y., & Chen, C. H. (2007). Mutual-authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2), 254–259.
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 11
    • 23744437250 scopus 로고    scopus 로고
    • A secure protocol for bluetooth piconets using elliptic curve cryptography
    • Hwang, M. S., Lee, C. C., Lee, J. Z., & Yang, C. C. (2005). A secure protocol for bluetooth piconets using elliptic curve cryptography. Telecommunication Systems, 29(3), 165–180.
    • (2005) Telecommunication Systems , vol.29 , Issue.3 , pp. 165-180
    • Hwang, M.S.1    Lee, C.C.2    Lee, J.Z.3    Yang, C.C.4
  • 13
    • 1942423668 scopus 로고    scopus 로고
    • Key distribution based on hierarchical access control for conditional access system in DTV broadcast
    • Jiang, T., Zheng, S., & Liu, B. (2004). Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Transactions on Consumer Electronics, 50(1), 225–230.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 225-230
    • Jiang, T.1    Zheng, S.2    Liu, B.3
  • 14
    • 6944222739 scopus 로고    scopus 로고
    • Secure communication between set-top box and smart card in DTV broadcasting
    • Jiang, T., Hou, Y., & Zheng, S. (2004). Secure communication between set-top box and smart card in DTV broadcasting. IEEE Transactions on Consumer Electronics, 50(3), 882–886.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.3 , pp. 882-886
    • Jiang, T.1    Hou, Y.2    Zheng, S.3
  • 17
    • 58149378951 scopus 로고    scopus 로고
    • Implementation of the storage manager for an IPTV set-top box
    • Kim, T., & Bahn, H. (2008). Implementation of the storage manager for an IPTV set-top box. IEEE Transactions on Consumer Electronics, 54(4), 1770–1775.
    • (2008) IEEE Transactions on Consumer Electronics , vol.54 , Issue.4 , pp. 1770-1775
    • Kim, T.1    Bahn, H.2
  • 21
    • 79951814345 scopus 로고    scopus 로고
    • An efficient authentication protocol for mobile communications
    • Lee, C. C., Liao, I. E., & Hwang, M. S. (2011). An efficient authentication protocol for mobile communications. Telecommunication Systems, 46(1), 31–41.
    • (2011) Telecommunication Systems , vol.46 , Issue.1 , pp. 31-41
    • Lee, C.C.1    Liao, I.E.2    Hwang, M.S.3
  • 23
    • 84936892450 scopus 로고
    • Cryptology for digital TV broadcasting
    • Macq, B., & Quisquater, J. (1995). Cryptology for digital TV broadcasting. Proceedings of the IEEE, 83(6), 944–957.
    • (1995) Proceedings of the IEEE , vol.83 , Issue.6 , pp. 944-957
    • Macq, B.1    Quisquater, J.2
  • 28
    • 32444435813 scopus 로고    scopus 로고
    • Radio frequency identification (RFID)
    • Roberts, C. M. (2006). Radio frequency identification (RFID). Computers & Security, 25(1), 18–26.
    • (2006) Computers & Security , vol.25 , Issue.1 , pp. 18-26
    • Roberts, C.M.1
  • 29
    • 42549157259 scopus 로고    scopus 로고
    • A framework for assessing RFID system security and privacy risks
    • Rotter, P. (2008). A framework for assessing RFID system security and privacy risks. IEEE Pervasive Computing, 7(2), 70–77.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.2 , pp. 70-77
    • Rotter, P.1
  • 31
    • 0037942544 scopus 로고    scopus 로고
    • Cryptanalysis of mutual authentication and key exchange for low power wireless communication
    • Shim, K. (2003). Cryptanalysis of mutual authentication and key exchange for low power wireless communication. IEEE Communications Letters, 7(5), 248–250.
    • (2003) IEEE Communications Letters , vol.7 , Issue.5 , pp. 248-250
    • Shim, K.1
  • 32
    • 77649192852 scopus 로고    scopus 로고
    • A cooperative cellular and broadcast conditional access system for Pay-TV systems
    • Shirazi, H., Cosmas, J., & Cutts, D. (2010). A cooperative cellular and broadcast conditional access system for Pay-TV systems. IEEE Transactions on Broadcasting, 56(1), 44–57.
    • (2010) IEEE Transactions on Broadcasting , vol.56 , Issue.1 , pp. 44-57
    • Shirazi, H.1    Cosmas, J.2    Cutts, D.3
  • 34
    • 67349156615 scopus 로고    scopus 로고
    • Standardization activities for IPTV set-top box remote management
    • Wey, J. S., Luken, J., & Heiles, J. (2009). Standardization activities for IPTV set-top box remote management. IEEE Internet Computing, 13(3), 32–39.
    • (2009) IEEE Internet Computing , vol.13 , Issue.3 , pp. 32-39
    • Wey, J.S.1    Luken, J.2    Heiles, J.3
  • 35
  • 36
    • 35248840517 scopus 로고    scopus 로고
    • Security architectures for B3G mobile networks
    • Xenakis, C., & Ntantogian, C. (2007). Security architectures for B3G mobile networks. Telecommunication Systems, 35(3), 123–139.
    • (2007) Telecommunication Systems , vol.35 , Issue.3 , pp. 123-139
    • Xenakis, C.1    Ntantogian, C.2
  • 37
    • 84879966092 scopus 로고    scopus 로고
    • Evaluating the energy consumption of the RFID tag collision resolution protocols
    • Yan, X., & Liu, X. (2011). Evaluating the energy consumption of the RFID tag collision resolution protocols. Telecommunication Systems. doi:10.1007/s11235-011-9563-8.
    • (2011) Telecommunication Systems
    • Yan, X.1    Liu, X.2
  • 38
    • 33745780946 scopus 로고    scopus 로고
    • A new secure key exchange protocol between STB and smart card in DTV broadcasting
    • Yoon, E. J., & Yoo, K. Y. (2006). A new secure key exchange protocol between STB and smart card in DTV broadcasting. In Proceedings of WISI (pp. 165–166).
    • (2006) Proceedings of WISI , pp. 165-166
    • Yoon, E.J.1    Yoo, K.Y.2
  • 39
    • 62449114806 scopus 로고    scopus 로고
    • Robust key exchange protocol between set-top box and smart card in DTV broadcasting
    • Yoon, E. J., & Yoo, K. Y. (2009). Robust key exchange protocol between set-top box and smart card in DTV broadcasting. Informatica, 20(1), 39–150.
    • (2009) Informatica , vol.20 , Issue.1 , pp. 39-150
    • Yoon, E.J.1    Yoo, K.Y.2
  • 41
    • 29344432870 scopus 로고    scopus 로고
    • Efficient radio resource management in integrated WLAN/CDMA mobile networks
    • Yu, F., & Krishnamurthy, V. (2005). Efficient radio resource management in integrated WLAN/CDMA mobile networks. Telecommunication Systems, 30(1), 177–192.
    • (2005) Telecommunication Systems , vol.30 , Issue.1 , pp. 177-192
    • Yu, F.1    Krishnamurthy, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.