메뉴 건너뛰기




Volumn 73, Issue 3, 2017, Pages 1085-1102

Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags

Author keywords

Anonymity; Authentication; Confidentiality; Internet of Things; RFID tags

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; INFORMATION DISSEMINATION; INTERNET; RADIO FREQUENCY IDENTIFICATION (RFID);

EID: 84983502970     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-016-1849-x     Document Type: Article
Times cited : (218)

References (41)
  • 1
    • 85013849461 scopus 로고    scopus 로고
    • Ashton K (2009) That “Internet of Things” thing. RFiD J. Last accessed August 2016
    • Ashton K (2009) That “Internet of Things” thing. RFiD J. http://www.itrco.jp/libraries/RFIDjournal-That%20Internet%20of%20Things%20Thing.pdf. Last accessed August 2016
  • 2
    • 84966359524 scopus 로고    scopus 로고
    • Recent advances delivered by mobile cloud computing and internet of things for big data applications: a survey. Int J Netw Manag
    • Stergiou C, Psannis KE (2016) Recent advances delivered by mobile cloud computing and internet of things for big data applications: a survey. Int J Netw Manag. doi:10.1002/nem.1930
    • (2016) doi:10.1002/nem.1930
    • Stergiou, C.1    Psannis, K.E.2
  • 3
    • 84906330795 scopus 로고    scopus 로고
    • Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
    • Shengdong X, Yuxiang W (2014) Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel Pers Commun 78(1):231–246
    • (2014) Wirel Pers Commun , vol.78 , Issue.1 , pp. 231-246
    • Shengdong, X.1    Yuxiang, W.2
  • 4
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–936
    • (2014) J Internet Technol , vol.15 , Issue.6 , pp. 929-936
    • Guo, P.1    Wang, J.2    Li, B.3    Lee, S.4
  • 5
    • 84931027814 scopus 로고    scopus 로고
    • HEVC in wireless environments
    • Psannis KE (2016) HEVC in wireless environments. J Real-Time Image Process 12(2):509–516
    • (2016) J Real-Time Image Process , vol.12 , Issue.2 , pp. 509-516
    • Psannis, K.E.1
  • 6
    • 70449553404 scopus 로고    scopus 로고
    • Efficient redundant frames encoding algorithm for streaming video over error prone wireless channels
    • Psannis K (2009) Efficient redundant frames encoding algorithm for streaming video over error prone wireless channels. IEICE ELEX J 6(21):1497–1502
    • (2009) IEICE ELEX J , vol.6 , Issue.21 , pp. 1497-1502
    • Psannis, K.1
  • 8
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: a survey
    • Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54:2787–2805
    • (2010) Comput Netw , vol.54 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 9
    • 85013808068 scopus 로고    scopus 로고
    • Cisco (2016) “IoT Threat Environment”.:. Last accessed July
    • Cisco (2016) “IoT Threat Environment”. Available at: http://www.cisco.com/c/dam/en/us/products/collateral/se/internet-of-things/C11-735871.pdf. Last accessed July
  • 10
    • 78650921155 scopus 로고    scopus 로고
    • From today’s intranet of things to a future internet of things: a wireless- and mobility-related view
    • Zorzi M, Gluhak A, Lange S, Bassi A (2010) From today’s intranet of things to a future internet of things: a wireless- and mobility-related view. IEEE Wirel Commun 17:43–51
    • (2010) IEEE Wirel Commun , vol.17 , pp. 43-51
    • Zorzi, M.1    Gluhak, A.2    Lange, S.3    Bassi, A.4
  • 11
    • 79954631342 scopus 로고    scopus 로고
    • Future internet of things architecture: like mankind neural system or social organization framework?
    • Ning HS, Wang ZO (2011) Future internet of things architecture: like mankind neural system or social organization framework? IEEE Commun Lett 15:461–463
    • (2011) IEEE Commun Lett , vol.15 , pp. 461-463
    • Ning, H.S.1    Wang, Z.O.2
  • 13
    • 85013854458 scopus 로고    scopus 로고
    • Near Field Comminications History (2016) “Timeline of RFID technology”. :, Last accessed July
    • Near Field Comminications History (2016) “Timeline of RFID technology”. Available at: http://www.nfcnearfieldcommunication.org/timeline.html, Last accessed July
  • 14
    • 85013747407 scopus 로고    scopus 로고
    • Postscapes (2016) “History of internet of things”. :. Last accessed July
    • Postscapes (2016) “History of internet of things”. Available at: http://postscapes.com/internet-of-things-history. Last accessed July
  • 15
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 16
    • 84876943063 scopus 로고    scopus 로고
    • Internet of things (IoT): a vision, architectural elements, and future directions
    • Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660
    • (2013) Futur Gener Comput Syst , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 17
    • 85013818899 scopus 로고    scopus 로고
    • Welbourne E, Battle L, Cole G et al (2009) Building the Internet of things Using RFID: The RFID ecosytem experience. IEEE Computing Society. :. Last accessed July 2016
    • Welbourne E, Battle L, Cole G et al (2009) Building the Internet of things Using RFID: The RFID ecosytem experience. IEEE Computing Society. Available at: http://homes.cs.washington.edu/~magda/papers/welbourne-ieeeic09.pdf. Last accessed July 2016
  • 19
    • 85013805282 scopus 로고    scopus 로고
    • Chris Edwards, (2016) “ RFID tags along with the Internet of Things”, Engineering and Technology magazine vol 9, Issue 8. :, Last accessed July
    • Chris Edwards, (2016) “ RFID tags along with the Internet of Things”, Engineering and Technology magazine vol 9, Issue 8. Available at: http://eandt.theiet.org/magazine/2014/08/tagging-along.cfm, Last accessed July
  • 20
    • 85013821941 scopus 로고    scopus 로고
    • Thrasher J (2016) “A primer on the internet of things and RFID”. :. Last accessed July
    • Thrasher J (2016) “A primer on the internet of things and RFID”. Available at: http://blog.atlasrfidstore.com/internet-of-things-and-rfid. Last accessed July
  • 22
    • 36248982045 scopus 로고    scopus 로고
    • SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • Chien H-Y (2007) SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secur Comput 4(4):337–340
    • (2007) IEEE Trans Dependable Secur Comput , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 25
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. Secur Pervasive Comput LNCS 2802:201–212
    • (2004) Secur Pervasive Comput LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 26
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Rhee K, Kwak J, Kim S, Won D (2005) Challenge-response based RFID authentication protocol for distributed database environment. Int Conf Secur Pervasive Comput SPC 2005:70–84
    • (2005) Int Conf Secur Pervasive Comput SPC , vol.2005 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 27
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: a research survey
    • Jules A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394
    • (2006) IEEE J Sel Areas Commun , vol.24 , Issue.2 , pp. 381-394
    • Jules, A.1
  • 28
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols. CRYPTO’05., vol 3126 of LNCS, IACR
    • Juels A, Weis S (2005) Authenticating pervasive devices with human protocols. CRYPTO’05., vol 3126 of LNCS, IACR. Springer, Heidelberg, pp 293–308
    • (2005) Springer, Heidelberg , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 33
    • 84947910726 scopus 로고    scopus 로고
    • Kelsey J, Schneier B, Wagner D, Hall C (1998) Cryptanalytic attacks on pseudorandom number generators, Fast Software Encryption, LNCS, vol 1372, Springer, Berlin. pp 168–188 (ISBN: 978-3-540-69710-71998)
    • Springer, Berlin , pp. 168-188
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 34
    • 84857498128 scopus 로고    scopus 로고
    • Security analysis of an ultra-lightweight RFID authentication protocol-SLMAP*
    • Erguler I, Unsal C, Anarim E, Saldamli G (2012) Security analysis of an ultra-lightweight RFID authentication protocol-SLMAP*. Secur Comm Netw 5:287–291
    • (2012) Secur Comm Netw , vol.5 , pp. 287-291
    • Erguler, I.1    Unsal, C.2    Anarim, E.3    Saldamli, G.4
  • 37
    • 70450265312 scopus 로고    scopus 로고
    • Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI
    • Phan R (2008) Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans Dependable Secur Comput 6(4):316–320
    • (2008) IEEE Trans Dependable Secur Comput , vol.6 , Issue.4 , pp. 316-320
    • Phan, R.1
  • 38
    • 45749087762 scopus 로고    scopus 로고
    • Traceable privacy of recent provably-secure RFID protocols”. Proceedings of Sixth Int’l Conf
    • Ouafi K, Phan RC-W (2008) “Traceable privacy of recent provably-secure RFID protocols”. Proceedings of Sixth Int’l Conf. Applied Cryptography and Network Security (ACNS ’08), pp 479–489
    • (2008) Applied Cryptography and Network Security (ACNS ’08) , pp. 479-489
    • Ouafi, K.1    Phan, R.C.-W.2
  • 41
    • 84862788058 scopus 로고    scopus 로고
    • A new ultralightweight RFID authentication protocol with permutation
    • Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705
    • (2012) IEEE Commun Lett , vol.16 , Issue.5 , pp. 702-705
    • Tian, Y.1    Chen, G.2    Li, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.