Efficient RFID Authentication protocol for Distribution Database Environment |
Choi, Eun-Young
(Graduate School of Information Management and Security, Korea University)
Lee, Su-Mi (Graduate School of Information Management and Security, Korea University) Lim, Jong-In (Graduate School of Information Management and Security, Korea University) Lee, Dong-Hoon (Graduate School of Information Management and Security, Korea University) |
1 | G. Avoine and Ph. Oechslin, 'A Scalable and Provably Secure Hash-Based RFID Protocol', The 2nd IEEE International Workshop on Pervasive Computing and Communication Security – PerSec 2005, IEEE Computer Society Press, Kauai Island, Hawaii, USA, 3, 2005 |
2 | EPCglobal, 'EPCTM Tag Data Standards Version 1.1 Rev.1.24 Standard Specification 01', 04, 2004 |
3 | A. Juels, R. Rivest and M. Szydlo, 'The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy'. In the 8th ACM Conference on Computer and CommunIcations Security, pp. 103-111, ACM Press. 2003 |
4 | S. A. Weis, S. E. Sarma, S. A. Weis and D. W. Engels, 'Security and privacy Aspects of Low-Cost Radio Frequency Identification Systems'. First International Conference on Security in Pervasive Computing, 2003. http://theory.lcs.mit. edu/sweis/spc-rfid.pdf |
5 | Sang-Soo Yeo and Sung Kwon Kim, 'Scalable and Flexible Privacy Protection Scheme for RFID Systems', ESAS 2005, LNCS 3813, pp. 153-163, 2005 |
6 | Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren, and Kwangjo Kim, 'Mutual authentication protocol for low-cost RFID, Ecrypt Workshop, Workshop on RFID and Lightweight Crypto, pp. 17-24, 2005 |
7 | M. Ohkubo, K. Suzuki and S. Kinoshita, 'Efficient Hash-Chain Based RFID Privacy Protection Scheme', Ubcomp2004 workshop |
8 | Jeonil Kang and Daehun Nyang, 'RFID Authentication Protocol with Strong Resistance against Tracea bility and Denial of Service Attacks', ESAS 2005, LNCS 3813, pp. 164-175, 2005 |
9 | Keunwoo Rhee, Jin Kwak, Seungjoo Kim and Dongho Won, 'Challenge- Response based secure RFID Authentication Protocol for Distributed Database Environment', SPC 2005, LNCS 3450, pp.70-84, Springer- Verlag, 4, 2005 |
10 | Su Mi Lee, Young Ju Hwang, Dong Hoon Lee and Jong In Lim, 'Efficient Authentication for Low-Cost RFID systems', ICCSA 05, LNCS 3480, pp.619-629, 2005 |
11 | S. E. Sarma, S. A. Weis and D. W. Engels, 'Radio-frequency identification systems'. CHES'02, LNCS 2523, pp.454-469, Springer-Verlag, 2002 |
12 | D. Henrici and Paul Muller, 'Hashbased Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers', PerSec'04 at IEEE PerCom. pp. 149-153, 2004 |
13 | A. Juels, 'Minimalist cryptography for Low-Cost RFID Tags', In The Fourth Internationl Conferecne on Security in Communication Networks- SCN 2004, LNCS 3352, pp. 149-164, Springer-Verlag. 2004 |
14 | Istvan Vajda and Levente Buttyan, 'Lightweight authentication protocols for low-cost RFID tags', Workshop on Security in Ubiquitous Computing, 2003 |
15 | S. E. Sarma, S. A. Weis and D. W. Engels, 'RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH- 014', AutoID Center, MIT, 2002 |
16 | S. E. Sarma, 'Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center', 2001. Abailable from http://www. autoidcenter.org |
17 | 유성호, 김기현, 황용호, 이필중, '상태 기반 RFID 인증 기법 프로토콜', 정보보호학회논문지, 제 4권, 6호, 12, 2004 |
18 | Auto-ID Center, '860Mhz-960MHz Class I Radio Frequency Identification Tag Radio Frequency and Logical communication Interface Specification Specification Proposed Recommendation Version 1.0.0. Technical Report MIT-AUTOID-TR-007', AutoID Center, MIT, 2002 |
19 | S. Junichiro, R. Jae-Cheol and S. Kouichi, 'Enhancing privacy of Universal Re-encryption scheme for RFID Tags', EUC 2004, LNCS 3207, pp.879-890, Springer-Verlag, 12, 2004 |
20 | A. Juels and R. Pappu, 'Squealing euros : Privacy protection in RFIDenabled banknotes', In proceedings of Financial Cryptography -FC'03, LNCS 2742, pp.103-121, Springer- Verlag, 2003 |