Efficient Tag Authentication Scheme using Tag ID Identification Bits in RFID Environment |
Jang, Bong-Im
(한남대학교 멀티미디어학과)
Jeong, Yoon-Su (충북대학교 전자계산학과 네트워크 보안연구실) Kim, Yong-Tae (한남대학교 멀티미디어학부) Park, Gil-Cheol (한남대학교 멀티미디어학부) |
1 | 이병주, 송창우, 정경용, 임기욱, 이정현, "RFID 시스템에서 Hash-Chain 기반 Tag-Grouping을 이용한 안전하고 효율적인 데이터베이스 검색", 한국콘텐츠학회논문지, Vol. 9, No. 9, pp.9-17, 2009. |
2 | Andrei Broder and Michael Mitzenmacher, "Network Applications of Bloom Filter: A Survey", Internet mathematics, Vol. 1, pp.485-509, 2004. DOI |
3 | 김진호, 서재우, 이필중, "저비용 RFID 시스템에 적합한 효율적인 인증 방법", 정보보호학회, 제18권, 제2호, pp.117-128, 2008. |
4 | 원태연, 천지영, 박춘식, 이동훈, "수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계", 정보보호학회, 제18권, 제6(A)호, 2008. |
5 | Hung-Yu Chien, Chi-sung Laih, "ECC-based lightweight authentication protocol with untraceability for low-cost RFID", Journal of Parallel and Distributed Computing, Vol. 69, pp.848-853, 2009. DOI ScienceOn |
6 | 안해순, 부기동, 윤은준, 남인길, "RFID/USN 환경을 위한 개선된 인증 프로토콜", 전자공학회 논문지, 제46권 CI편, 제1호, pp.1-10, 2009. |
7 | H. Chien, C. Chen, "Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards", Computer Standards & Interfaces, Vol. 29, pp.254-259, 2007. DOI ScienceOn |
8 | Alex X. Liu, LeRoy A. Bailey, "PAP: A Privacy and authentication protocol for passive RFID tags", Computer Communications, 32, pp.1194-1199, 2009. DOI ScienceOn |
9 | Hung-Yu Chien, Chen-Wei Huang, "A Lightweight Authentication Protocol for Low-Cost RFID", Journal of Signal Processing Systems, 59, pp.95-102, 2010. DOI ScienceOn |
10 | Woo-Sik Bae, Shin-Hyeong Choi, Kun Hee Han "RFID Security Authentication Protocol for the Ubiquitous Environment", Korea Society of Computer Information, Vol. 12, No. 4, pp.69-75, 2007. |
11 | S. E. Sarma, S. A. Weis and D. W. Engels, "RFID systems, security & privacy implications", Cryptographic Hardware and Embedded Systems- CHES 2002, LNCS 2523, pp.454-469, 2003. |
12 | Soo-Young Kang, Deok-Gyu Lee, Im-Yeong lee, "A study on secure RFID mutual authentication scheme in pervasive computing environment", Computer Communications, Vol. 31, pp.4248-4254, 2008. DOI ScienceOn |
13 | G. Avoine and P. Oechslin, "RFID Traceability: A Multilayer Problem", In Proceeding of the Financial Cryptography '05 - FC'05, LNCS 3570, pp.125-140, 2005. |
14 | S. Sarma, S. Weis and D. Engels, "Radio- Frequency identification: security Risks and Challenges", RSA Laboratories Cryptobytes, Vol.6, No.1, pp.2-9, 2003. |
15 | Yuichi Kobayashi, Toshiyuki Kuwana, Yojitanigughi and Norihisa Komoda "Group Management of RFID Passwords for Privacy Protection", Electronics and Communications in Japan, Vol. 92, No. 10, pp.24-31, 2009. DOI ScienceOn |
16 | Klaus Finkenzeller, RFID Handbook, Second Edition, John Wiley& Sons, 2003. |
17 | Stephen A. Weis, Sanjay E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", Security in Pervasive Computing 2003, LNCS 2802, pp.201-212, 2004. |