References
- O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
- Hwa-jeon Seo, et al, "IoT Security Technical Trend", Korean Institute of Electromagnetic Engineering Society, Vol. 24, No. 4, pp. 27-35, 2013, 7. https://doi.org/10.5515/KJKIEES.2013.24.1.27
- P. de Leusse, P. Periorellis, T. Dimitrakos, and S.K. Nair, "Self managed security cell, a security model for the internet of things and services", In Advances in Future Internet, 2009 First International Conference on, pp. 47-52, 2009.
- D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "Hight: a new block cipher suitable for low-resource device," In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 06), pp. 46-59, 2006.
- Jin-seob Shin, Young-ho Park, "An Authentication Protocol using the EXOR and the Hash Function in RFID/USN," Korea Society of Industrial Information Systems, Vol. 12, No. 2, pp.24-29, 2007. 6.
- Hae-Soon Ahn, Ki-Dong Bu, "Improved Authentication Protocol for RFID/USN Environment," The Institute of Electronics and Information Engineers, Vol.46, No. CI-1, 2009.
- O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
- D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm", In Proceedings of the 7th International Conference on RFID Security and Privacy(RFIDSec'11), pp. 19-31, 2011.
- http://www.opnet.com
- Taeyang Eom, Jeong-Hyun, "Performance Evaluation of Authentication Protocol for Mobile RFID Privacy", Korean Institute of Communication and Information Sciences, Vol. 36, No 6, 2011. 6.
Cited by
- Performance Analysis of Key Exchange Protocols on ETSI Standard vol.8, pp.6, 2015, https://doi.org/10.17661/jkiiect.2015.8.6.520
- 로그 분석 처리율 향상을 위한 맵리듀스 기반 분할 빅데이터 분석 기법 vol.11, pp.5, 2015, https://doi.org/10.17661/jkiiect.2018.11.5.593
- Research on Security Control Scheme of Power Distribution Internet of Things vol.645, pp.None, 2015, https://doi.org/10.1088/1755-1315/645/1/012070