Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System |
Ha, Jae-Cheol
(Hoseo University)
Park, Jea-Hoon (Kyungpook National University) Ha, Jung-Hoon (Kyungpook National University) Kim, Hwan-Koo (Hoseo University) Moon, Sang-Jae (Kyungpook National University) |
1 | Auto-ID Center, "860MHz-960MHz Class I Radio Frequency Identification Tag Radio Frequency and logical Communication Interface Specification Proposed Recommendation Ver. 1.0.0, Technical Report, MITAUTOID- TR- 007", AutoID Center, MIT, 2002 |
2 | International Standard ISO/IEC 18000-6: Information technology- Radio frequency identification for item management-Part 6: Parameters for air interface communications at 860MHz to 960MHz, 2004 |
3 | D. Henrici, and P. Muller, "Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers", Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communication Security, pp. 149- 153, 2004 |
4 | M. Ohkubo, K. Suzuki and S. Kinoshita, "Hash -Chain Based Forward Secure Privacy Protection Scheme for Low-Cost RFID", In proceedings of the SCIS'04, pp. 719-724, 2004 |
5 | J. C. Ha, J. H. Ha, S. Moon and C. Boyd, LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System, ICUCT 2006, LNCS 4412, Dec., 2006 |
6 | A, Jules and S. A. Weis, "Defining Strong Privacy for RFID", Cryptology ePrint Archive, Report 2006/137, Referenced 2006 at http://eprint.iacr.org, 2006 |
7 | E. Choi, S. Lee, and D. Lee. "Efficient RFID Authentication Protocol for Ubiquitous Computing Environment", EUC-2005, LNCS 3823, pp. 945-954, Springer-Verlag, 2005 |
8 | S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, 2004 |
9 | D. Kwon, D. Han, J. Lee, and Y. Yeom, "Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq2005", EUC- 2006, LNCS 4097, pp. 262-270, 2006 |
10 | K. Rhee, J. Kwak, S. Kim and D. Won, "Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment", SPC'05, LNCS 3450, pp. 70-84, Springer-Verlag, 2005 |
11 | S. Lee, Y. Hwang, D. Lee and J. Lim, "Efficient Authentication for Low-cost RFID Systems", ICCSA'05, LNCS 3480, pp. 619- 627, Springer-Verlag, 2005 |
12 | J. Saito, J. Ryou, and K. Sakurai, "Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags", EUC-2004, LNCS 3207, pp. 879-890, Springer-Verlag, 2004 |
13 | 최은영, 이수미, 임종인, 이동훈, "분산시스템 환경에 적합한 효율적인 RFID 인증시스템", 한국정보보호학회논문지, 제 16권, 제 6호, pp. 25-35, 2006. 12 과학기술학회마을 |
14 | 권대성, 이주영, 구본욱, "경량 RFID 상호인증 프로토콜 LMAP, M2AP, EMAP에 대한 향상된 취약성 분석", 한국정보보호학회논문지, 제 17권, 제 4호, pp. 103-113, 2007. 8 과학기술학회마을 |
15 | P. Peris-Lopez, J. Hermandez-Castro, J. Estevez-Tapaidor, and A. Ribagorda, "EMAP: An efficient Mutual-Authentication Protocol for Low-cost RFID tags", Proceedings of OTM Federated Conferences and Workshop: IS Workshop, Nov., 2006 |