메뉴 건너뛰기




Volumn 38, Issue 10, 2014, Pages

Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol

Author keywords

Anonymity; Authentication; Elliptic curve cryptography; Radio frequency identification

Indexed keywords

ALGORITHM; COMPUTER SECURITY; DEVICES; HEALTH CARE DELIVERY; PROCEDURES; RADIO FREQUENCY IDENTIFICATION DEVICE; SYSTEM ANALYSIS;

EID: 84936743193     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-014-0116-z     Document Type: Article
Times cited : (91)

References (29)
  • 3
    • 32444435813 scopus 로고    scopus 로고
    • Radio frequency identification
    • C.M. Robert, Radio frequency identification, Computers and Security 25 (2006) 18-26.
    • (2006) Computers and Security , vol.25 , pp. 18-26
    • Robert, C.M.1
  • 5
    • 79961169316 scopus 로고    scopus 로고
    • Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization
    • S. L. Ting, S. K. Kwok, Albert H. C. Tsang, W. B. Lee, Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization, Journal of Medical Systems 35 (4) (2011) 657-669.
    • (2011) Journal of Medical Systems , vol.35 , Issue.4 , pp. 657-669
    • Ting, S.L.1    Kwok, S.K.2    Albert, H.3    Tsang, C.4    Lee, W.B.5
  • 6
    • 84867297288 scopus 로고    scopus 로고
    • Two RFID-based solutions for secure inpatient medication administration
    • Y. Yen, N. Lo, T. Wu, Two RFID-based solutions for secure inpatient medication administration, Journal of Medical Systems 36(5) (2012) 2769-2778.
    • (2012) Journal of Medical Systems , vol.36 , Issue.5 , pp. 2769-2778
    • Yen, Y.1    Lo, N.2    Wu, T.3
  • 8
    • 33645857377 scopus 로고    scopus 로고
    • Cryptography and authentication on RFID tags for apparels
    • K. Wong, P. Hui, A. Chan, Cryptography and authentication on RFID tags for apparels, Computer in Industry 57 (2005) 342–349.
    • (2005) Computer in Industry , vol.57 , pp. 342-349
    • Wong, K.1    Hui, P.2    Chan, A.3
  • 9
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • Y. Chen, J.-S. Chou, H.-M. Sun, A novel mutual authentication scheme based on quadratic residues for RFID systems, Computer Networks 52 (2008) 2373–2380.
    • (2008) Computer Networks , vol.52 , pp. 2373-2380
    • Chen, Y.1    Chou, J.-S.2    Sun, H.-M.3
  • 10
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • H.-Y. Chien, C.-H. Chen, Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards, Computer Standards and Interfaces 29 (2007) 254–259.
    • (2007) Computer Standards and Interfaces , vol.29 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 13
  • 14
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • J. Cho, S. Yeo, S. Kim, Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value, Computer Communications 34(3) (2011) 391-397.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 391-397
    • Cho, J.1    Yeo, S.2    Kim, S.3
  • 15
    • 84857462261 scopus 로고    scopus 로고
    • Cryptanalysis of Cho et al.’s protocol, a hash-based mutual authentication protocol for RFID systems
    • M. Safkhani, P. Peris-Lopez, J.C. Hernandez-Castro, N. Bagheri, M. Naderi, Cryptanalysis of Cho et al.’s protocol, a hash-based mutual authentication protocol for RFID systems, Cryptology ePrint Archive, Report 2011/311, 2011. .
    • (2011) Cryptology ePrint Archive, Report
  • 16
    • 77949562527 scopus 로고    scopus 로고
    • Cryptanalysis of some RFID authentication protocols
    • T. Cao, P. Shen, Cryptanalysis of some RFID authentication protocols, Journal of Communications 3 (7) (2008) 20–27.
    • (2008) Journal of Communications , vol.3 , Issue.7 , pp. 20-27
    • Cao, T.1    Shen, P.2
  • 17
    • 78751649779 scopus 로고    scopus 로고
    • Improvement of the RFID authentication scheme based on quadratic residues
    • T.-C. Yeh, C.-H. Wu, Y.-M. Tseng, Improvement of the RFID authentication scheme based on quadratic residues, Computer Communications (34) (2011) 337–341.
    • (2011) Computer Communications (34) , pp. 337-341
    • Yeh, T.-C.1    Wu, C.-H.2    Tseng, Y.-M.3
  • 18
    • 84870065586 scopus 로고    scopus 로고
    • A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
    • R. Doss, S. Sundaresan, W. Zhou, A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems, Ad Hoc Networks 11(1) (2013) 383-396.
    • (2013) Ad Hoc Networks , vol.11 , Issue.1 , pp. 383-396
    • Doss, R.1    Sundaresan, S.2    Zhou, W.3
  • 19
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In
    • Y. Lee, L. Batina, I. Verbauwhede, EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In IEEE International Conference on RFID 2008. IEEE, 97–104, 2008.
    • (2008) IEEE International Conference on RFID 2008. IEEE , pp. 97-104
    • Lee, Y.1    Batina, L.2    Verbauwhede, I.3
  • 22
    • 70349268101 scopus 로고    scopus 로고
    • Untraceable RFID authentication protocols: revision of EC-RAC
    • IEEE, Orlando,FL,USA:
    • Y. Lee, I. Batina, I. Verbauwhede, Untraceable RFID authentication protocols: revision of EC-RAC. In IEEE International Conference on RFID 2009. IEEE: Orlando,FL,USA, 178–185, 2009.
    • (2009) IEEE International Conference on RFID 2009 , pp. 178-185
    • Lee, Y.1    Batina, I.2    Verbauwhede, I.3
  • 24
    • 84872326702 scopus 로고    scopus 로고
    • Privacy challenges in RFID systems
    • Giusto D, Lera A, Morabito G, Atzori L, (eds), Springer, New York:
    • Y. Lee, L. Batina, I. Verbauwhede, Privacy challenges in RFID systems. In The Internet of Things, Giusto D, Lera A, Morabito G, Atzori L (eds): Springer New York, 397–407, 2010.
    • (2010) The Internet of Things , pp. 397-407
    • Lee, Y.1    Batina, L.2    Verbauwhede, I.3
  • 25
    • 84872290581 scopus 로고    scopus 로고
    • Vulnerability analysis of elliptic curve cryptography–based RFID authentication protocols
    • C. Lv, H. Li, J. Ma, Y. Zhang, Vulnerability analysis of elliptic curve cryptography–based RFID authentication protocols, Transactions on Emerging Telecommunications Technologies 23(7) (2012) 618-624.
    • (2012) Transactions on Emerging Telecommunications Technologies , vol.23 , Issue.7 , pp. 618-624
    • Lv, C.1    Li, H.2    Ma, J.3    Zhang, Y.4
  • 26
    • 84899644274 scopus 로고    scopus 로고
    • A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    • Y. Liao, C. Hsiao, A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol, Ad Hoc Networks, 2013, doi: 10.1016/j.adhoc.2013.02.004.
    • (2013) Ad Hoc Networks
    • Liao, Y.1    Hsiao, C.2
  • 27
    • 84898922647 scopus 로고    scopus 로고
    • Attack on Liao and Hsiao’s Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol. Cryptology ePrint Archive
    • R. Peeters, J. Hermans, Attack on Liao and Hsiao’s Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol. Cryptology ePrint Archive, Report 2013/399, 2013.
    • (2013) Report , vol.399
    • Peeters, R.1    Hermans, J.2
  • 29
    • 78049296439 scopus 로고    scopus 로고
    • A Pairing-free Identity-based Authenticated Key Agreement Protocol with Minimal Message Exchanges
    • X. Cao, W. Kou, A Pairing-free Identity-based Authenticated Key Agreement Protocol with Minimal Message Exchanges, Information Sciences, 180 (15), 2895–2903, 2010.
    • (2010) Information Sciences , vol.180 , Issue.15 , pp. 2895-2903
    • Cao, X.1    Kou, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.