메뉴 건너뛰기




Volumn 0, Issue 9783642143120, 2010, Pages 237-257

Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; BAR CODES; COSTS; HARDWARE SECURITY; SUPPLY CHAINS; TRAFFIC CONTROL; TRANSPORTATION CHARGES;

EID: 84989949883     PISSN: 16197100     EISSN: 2197845X     Source Type: Book Series    
DOI: 10.1007/978-3-642-14452-3_11     Document Type: Chapter
Times cited : (17)

References (47)
  • 2
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial Model for Radio Frequency Identification
    • Report 2005/049
    • G. Avoine, Adversarial Model for Radio Frequency Identification. Cryptology ePrint Archive, Report 2005/049, 2005. http://eprint.iacr.org/
    • (2005) Cryptology Eprint Archive
    • Avoine, G.1
  • 4
    • 84937408891 scopus 로고    scopus 로고
    • GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
    • Springer, Berlin
    • M. Bellare, A. Palacio, GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. in Advances in Cryptology - CRYPTO’02. Lecture Notes in Computer Science, vol. 2442 (Springer, Berlin, 2002), pp. 162-177
    • (2002) Advances in Cryptology - CRYPTO’02. Lecture Notes in Computer Science , vol.2442 , pp. 162-177
    • Bellare, M.1    Palacio, A.2
  • 7
    • 51349120734 scopus 로고    scopus 로고
    • Trusted-HB: A low-cost version of HB+ secure against man-in-themiddle attacks
    • J. Bringer, H. Chabanne, Trusted-HB: A low-cost version of HB+ secure against man-in-themiddle attacks. IEEE Trans. Inf. Theory 54(9), 4339-4342 (2008)
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4339-4342
    • Bringer, J.1    Chabanne, H.2
  • 12
    • 77952353685 scopus 로고    scopus 로고
    • Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC
    • T. Deursen, S. Radomirović, Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC, in Cryptology ePrint Archive: Report 2009/332, 2009
    • (2009) Cryptology Eprint Archive: Report 2009/332
    • Deursen, T.1    Radomirović, S.2
  • 16
    • 35048859848 scopus 로고    scopus 로고
    • In Strong Authentication for RFID Systems using the AES Algorithm
    • ed. by M. Joye, J.J, Lecture Notes in Computer Science, Springer, Heidelberg
    • M. Feldhofer, S. Dominikus, J. Wolkerstorfer, in Strong Authentication for RFID Systems using the AES Algorithm. ed. by M. Joye, J.J. Quisquater. Cryptographic Hardware and Embedded Systems - CHES’04. Lecture Notes in Computer Science, vol. 3156 (Springer, Heidelberg, 2004), pp. 357-370
    • (2004) Quisquater. Cryptographic Hardware and Embedded Systems - CHES’04 , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 18
    • 27644472569 scopus 로고    scopus 로고
    • An active attack against HB+ - a provably secure lightweight authentication protocol
    • H. Gilbert, M. Robshaw, H. Sibert, An active attack against HB+ - a provably secure lightweight authentication protocol. IEE Process. Lett. 41(21), 1169-1170 (2005)
    • (2005) IEE Process. Lett , vol.41 , Issue.21 , pp. 1169-1170
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 19
    • 45749153036 scopus 로고    scopus 로고
    • ed. by S. Bellovin, R. Gennaro, ACNS 2008. Lecture Notes in Computer Science, Springer, Heidelberg
    • G. Hammouri, B. Sunar, in PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. ed. by S. Bellovin, R. Gennaro. Applied Cryptography and Network Security: 6th International Conference, ACNS 2008. Lecture Notes in Computer Science, vol. 5037 (Springer, Heidelberg, 2008)
    • (2008) PUF-HB: A Tamper-Resilient HB Based Authentication Protocol , vol.5037
    • Hammouri, G.1    Sunar, B.2
  • 21
    • 70350639755 scopus 로고    scopus 로고
    • ECC Is Ready for RFID - A Proof in Silicon
    • Lecture Notes in Computer Science, Springer, Heidelberg
    • D. Hein, J. Wolkerstorfer, N. Felber, in ECC Is Ready for RFID - A Proof in Silicon. Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 5381 (Springer, Heidelberg, 2009), pp. 401-413.
    • (2009) Selected Areas in Cryptography , vol.5381 , pp. 401-413
    • Hein, D.1    Wolkerstorfer, J.2    Felber, N.3
  • 25
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • A. Juels, RFID security and privacy: A research survey. IEEE J. Sel. Areas Commun. 24(2), 381-394 (2006)
    • (2006) IEEE J. Sel. Areas Commun , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 26
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Protocols
    • Lecture Notes in Computer Science, IACR, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • A. Juels, S.A. Weis, in Authenticating Pervasive Devices with Human Protocols. Proceedings of CRYPTO’05. Lecture Notes in Computer Science, vol. 3126 (IACR, Springer-Verlag, Berlin, Heidelberg, New York, NY, 2005), pp. 293-308
    • (2005) Proceedings of CRYPTO’05 , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 28
    • 84943632039 scopus 로고    scopus 로고
    • In Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other systems
    • N. Koblitz, editor, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • P. Kocher, in Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other systems. In N. Koblitz, editor, Advances in Cryptology: Proceedings of CRYPTO’96, number 1109 in Lecture Notes in Computer Science, pages 104-113. Springer-Verlag, Berlin, Heidelberg, New York, NY, 1996.
    • (1996) Advances in Cryptology: Proceedings of CRYPTO’96, Number 1109 in Lecture Notes in Computer Science , pp. 104-113
    • Kocher, P.1
  • 29
    • 84939573910 scopus 로고    scopus 로고
    • In Differential Power Analysis
    • ed. by M. Wiener, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • P. Kocher, J. Jaffe, B. Jun, in Differential Power Analysis. ed. by M. Wiener. Advances in Cryptology: Proceedings of CRYPTO’99. Lecture Notes in Computer Science, vol. 1666, (Springer-Verlag, Berlin, Heidelberg, New York, NY, 1999), pp. 388-397
    • (1999) Advances in Cryptology: Proceedings of CRYPTO’99 , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 31
    • 49049105964 scopus 로고    scopus 로고
    • In EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol
    • IEEE
    • Y.K. Lee, L. Batina, I. Verbauwhede, in EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol. IEEE International Conference on RFID (IEEE, 2008), pp. 97-104
    • (2008) IEEE International Conference on RFID , pp. 97-104
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 33
  • 34
    • 41549156956 scopus 로고    scopus 로고
    • In A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • J. Lim, H. Oh, S. Kim, in A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. Proceedings of the 4th International Conference on InformationSecurity Practice and Experience (ISPEC ’08). Lecture Notes in Computer Science, vol. 4991 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2008), pp. 278-289
    • (2008) Proceedings of the 4Th International Conference on Informationsecurity Practice and Experience (ISPEC ’08) , vol.4991 , pp. 278-289
    • Lim, J.1    Oh, H.2    Kim, S.3
  • 35
    • 33745597876 scopus 로고    scopus 로고
    • In A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • D. Molnar, A. Soppera, D. Wagner, in A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. Proceedings of the 12th Annual International Workshop of Selected Areas in Cryptography (SAC ’05). Lecture Notes in Computer Science, vol. 3897 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2005), pp. 276-290.
    • (2005) Proceedings of the 12Th Annual International Workshop of Selected Areas in Cryptography (SAC ’05) , vol.3897 , pp. 276-290
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 36
  • 37
  • 38
    • 25444432606 scopus 로고    scopus 로고
    • RFID privacy issues and technical challenges
    • M. Ohkubo, K. Suzuki, S. Kinoshita, RFID privacy issues and technical challenges. Commun. ACM 48(9), 66-71 (2005)
    • (2005) Commun. ACM , vol.48 , Issue.9 , pp. 66-71
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 39
    • 84875762817 scopus 로고
    • Advances in Cryptology - CRYPTO’92, ed. by E.F. Brickell. Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • T. Okamoto, Provably secure and practical identification schemes and corresponding signature schemes. Advances in Cryptology - CRYPTO’92, ed. by E.F. Brickell. Lecture Notes in Computer Science, vol. 740 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 1992), pp. 31-53
    • (1992) Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 40
    • 30344466340 scopus 로고    scopus 로고
    • Security standards for the RFID market
    • T. Phillips, T. Karygiannis, R. Kuhn, Security standards for the RFID market. Secur. Priv. 3(6), 85-89 (2005)
    • (2005) Secur. Priv , vol.3 , Issue.6 , pp. 85-89
    • Phillips, T.1    Karygiannis, T.2    Kuhn, R.3
  • 42
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • ed. by G. Brassard. Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • C.-P. Schnorr, Efficient identification and signatures for smart cards. Advances in Cryptology - CRYPTO’89, ed. by G. Brassard. Lecture Notes in Computer Science, vol. 435 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 1989), pp. 239-252
    • (1989) Advances in Cryptology - CRYPTO’89 , vol.435 , pp. 239-252
    • Schnorr, C.-P.1
  • 45
    • 33745654539 scopus 로고    scopus 로고
    • RFID-Tags for Anti-Counterfeiting
    • ed. by D. Pointcheval, San Jose, CA, USA. Lecture Notes in Computer Science, Springer, Heidelberg, Feb 13-17
    • P. Tuyls, L. Batina, RFID-Tags for Anti-Counterfeiting. ed. by D. Pointcheval. Topics in Cryptology - CT-RSA - The Cryptographers’ Track at the RSA Conference, San Jose, CA, USA. Lecture Notes in Computer Science, vol. 3860 (Springer, Heidelberg, Feb 13-17 2006), pp. 115-131
    • (2006) Topics in Cryptology - CT-RSA - the Cryptographers’ Track at the RSA Conference , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 46
    • 38149038702 scopus 로고    scopus 로고
    • In On Privacy Models for RFID
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • S. Vaudenay, in On Privacy Models for RFID. Advances in Cryptology (ASIACRYPT’07). Lecture Notes in Computer Science, vol. 4833 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2007), pp. 68-87
    • (2007) Advances in Cryptology (ASIACRYPT’07) , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 47
    • 21144438831 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
    • S.A. Weis, S. Sarma, R. Rivest, D. Engels, in Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Proceedings of the 1st International Conference on Security in Pervasive Computing (SPC ’03). Lecture Notes in Computer Science, vol. 2802 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2003), pp. 454-469
    • (2003) Proceedings of the 1St International Conference on Security in Pervasive Computing (SPC ’03) , vol.2802 , pp. 454-469
    • Weis, S.A.1    Sarma, S.2    Rivest, R.3    Engels, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.