메뉴 건너뛰기




Volumn 55, Issue , 2015, Pages 271-280

A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system

Author keywords

DoS attack; Mutual authentication; Privacy; RFID; Strong anonymity

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; AUTOMATION; BAR CODES; CRYPTOGRAPHY; DATA PRIVACY; DENIAL-OF-SERVICE ATTACK; HASH FUNCTIONS; MOBILE SECURITY;

EID: 84947040044     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2015.05.004     Document Type: Article
Times cited : (75)

References (27)
  • 4
    • 84919847449 scopus 로고    scopus 로고
    • Consideration on the Brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
    • J.-S. Cho, Y.-S. Jeong, and S. Park Consideration on the Brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol Comput Math Appl 2012
    • (2012) Comput Math Appl
    • Cho, J.-S.1    Jeong, Y.-S.2    Park, S.3
  • 5
    • 33847330246 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • T. Dimitriou A lightweight RFID protocol to protect against traceability and cloning attacks Proceedings of SecureComm'05 2005 59 66
    • (2005) Proceedings of SecureComm'05 , pp. 59-66
    • Dimitriou, T.1
  • 9
    • 85027455461 scopus 로고    scopus 로고
    • Lightweight and energy efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
    • P. Gope, and T. Hwang Lightweight and energy efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks IEEE Syst J 2015 10.1109/JSYST.2015.2416396
    • (2015) IEEE Syst J
    • Gope, P.1    Hwang, T.2
  • 10
    • 84929945678 scopus 로고    scopus 로고
    • Enhanced secure mutual authentication, and key agreement scheme preserving user anonymity in global mobile networks
    • P. Gope, and T. Hwang Enhanced secure mutual authentication, and key agreement scheme preserving user anonymity in global mobile networks Wirel Personal Commun 2015 10.1007/s11277-015-2344-z
    • (2015) Wirel Personal Commun
    • Gope, P.1    Hwang, T.2
  • 11
    • 84947023563 scopus 로고    scopus 로고
    • http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/WiFiLBS-DG/wifich6.pdf.
  • 12
    • 84903610110 scopus 로고    scopus 로고
    • Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets
    • T. Hwang, and P. Gope Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets Wirel Personal Commun 77 1 2014 197 224
    • (2014) Wirel Personal Commun , vol.77 , Issue.1 , pp. 197-224
    • Hwang, T.1    Gope, P.2
  • 13
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • A. Juels RFID security and privacy: a research survey IEEE J Sel Areas Commun 24 2 2006 381 394 10.1109/JSAC.2005.861395
    • (2006) IEEE J Sel Areas Commun , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 14
    • 38149094945 scopus 로고    scopus 로고
    • A study on low-cost RFID system management with mutual authentication scheme in ubiquitous
    • Kang S.-Y., and I.-Y. Lee A study on low-cost RFID system management with mutual authentication scheme in ubiquitous Proceedings of APNOMS, 4773, LNCS 2007 492 502
    • (2007) Proceedings of APNOMS, 4773, LNCS , pp. 492-502
    • Kang, S.-Y.1    Lee, I.-Y.2
  • 15
    • 53749094694 scopus 로고    scopus 로고
    • Public key cryptography based privacy preserving multi-context RFID infrastructure
    • S.V. Kaya, E. Savaş, A. Levi, and Ö. Erçetin Public key cryptography based privacy preserving multi-context RFID infrastructure Ad Hoc Netw 7 2009 136 152
    • (2009) Ad Hoc Netw , vol.7 , pp. 136-152
    • Kaya, S.V.1    Savaş, E.2    Levi, A.3    Erçetin, Ö.4
  • 16
    • 84869783330 scopus 로고    scopus 로고
    • De-synchronization attack on hash-based RFID mutual authentication protocol
    • H. Kim De-synchronization attack on hash-based RFID mutual authentication protocol J Secur Eng 9 4 2012 357 366
    • (2012) J Secur Eng , vol.9 , Issue.4 , pp. 357-366
    • Kim, H.1
  • 17
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz Elliptic curve cryptosystems Math Comput 48 1987 203 209
    • (1987) Math Comput , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 19
    • 84899644274 scopus 로고    scopus 로고
    • A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    • Liao Y.-P., and C. Hsiao A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol Ad Hoc Netw 18 2014 133 146
    • (2014) Ad Hoc Netw , vol.18 , pp. 133-146
    • Liao, Y.-P.1    Hsiao, C.2
  • 23
    • 84889098244 scopus 로고    scopus 로고
    • Cryptanalysis of the Cho et al protocol: A hash-based RFID tag mutual authentication protocol
    • Part B, 15
    • M. Safkhani, P. Peris-Lopez, J.C. Hernandez-Castro, and N. Bagheri Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol J Comput Appl Math 259 March 2014 571 577 Part B, 15
    • (2014) J Comput Appl Math , vol.259 , pp. 571-577
    • Safkhani, M.1    Peris-Lopez, P.2    Hernandez-Castro, J.C.3    Bagheri, N.4
  • 24
    • 85008055668 scopus 로고    scopus 로고
    • Secure and server-less RFID authentication and search protocols
    • Tan C.C., Sheng B., and Li Q. Secure and server-less RFID authentication and search protocols IEEE Trans Wirel Commun 7 4 April 2008 1400 1407
    • (2008) IEEE Trans Wirel Commun , vol.7 , Issue.4 , pp. 1400-1407
    • Tan, C.C.1    Sheng, B.2    Li, Q.3
  • 26
    • 79952396973 scopus 로고    scopus 로고
    • Security improvement in authentication protocol for Gen-2 based RFID system
    • Wang L., Yi X., C. Lv, and Guo Y. Security improvement in authentication protocol for Gen-2 based RFID system J Convergence Inform Technol AICIT 6 1 2011 157 169
    • (2011) J Convergence Inform Technol AICIT , vol.6 , Issue.1 , pp. 157-169
    • Wang, L.1    Yi, X.2    Lv, C.3    Guo, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.