Uneingeschränkter Zugang

State of the Art on Secure and Low Cost RFID Authentication Protocols for RFID Based Vehicle License Plate


Zitieren

A. Juels, “Minimalist Cryptography for RFID Tags,” in Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, Springer, Heidelberg, 2005. Search in Google Scholar

F.Karray, M.Alemzadeh, J. AbouSaleh and M.N.Arab, “Human-Computer Interaction: Overview on State of the Art”, International Journal On Smart Sensing And Intelligent Systems,2008, Vol. 1, No. 1, pp.137-159.10.21307/ijssis-2017-283 Search in Google Scholar

D. Henrici, and P. Muller, “Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers, “ in Proceedings of Workshop on Pervasive Computing and Communications Security, 2004. Search in Google Scholar

D. Molnar and D. Wagner, “Privacy and Security in Library RFID Issues, Practices, and Architectures,” in ACM Conference on Computer and Communication Security, 2004.10.1145/1030083.1030112 Search in Google Scholar

G. Avoine, P. Oechslin, “RFID Traceability: A Multilayer Problem,” Financial Cryptography, 2005.10.1007/11507840_14 Search in Google Scholar

K. Rhee, J. Kwak, S. Kim, D. Won, “Challenge-response based RFID authentication protocol for distributed database environment”International Conference on Security in Pervasive Computing SPC 2005, pp. 70-84, 2005.10.1007/978-3-540-32004-3_9 Search in Google Scholar

Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM vol. 24, no.11, pp 770-772, 1981.10.1145/358790.358797 Search in Google Scholar

M. Ohkubo, K. Suzuki, and S. Kinoshita, “Cryptographic approach to privacy-friendly tags”, RFID Privacy Workshop, 2003. Search in Google Scholar

M.Langheinrich and R.Marti, “Practical Minimalist Cryptography for RFID Privacy,”IEEE Systems Journal, vol. 1, no. 2, Dec 2007.10.1109/JSYST.2007.907683 Search in Google Scholar

P.P.Lopez, J.C.H. Castro, J.M.E. Tapiador, and A.Ribagorda, “RFID Systems: A Survey on Security Threats and Proposed Solutions,” IFIP 2006, PWC 2006, LNCS 4217, pp. 159– 170, 2006.10.1007/11872153_14 Search in Google Scholar

R. Want, Enabling Ubiquitous sensing with RFID, Computer 37 (4), 2004, pp. 84-86.10.1109/MC.2004.1297315 Search in Google Scholar

S. Han, T.S. Dhillon, and E. Chang, “Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database,”MSN 2007, LNCS 4864, pp. 623–632.10.1007/978-3-540-77024-4_57 Search in Google Scholar

S. Han, V. Potdar, and E. Chang, “Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor”, ICCSA 2007, LNCS 4707, pp. 227 – 238, 2007.10.1007/978-3-540-74484-9_20 Search in Google Scholar

S. Lee, H. Lee, T. Asano, and K. Kim, “Enhanced RFID Mutual Authentication Scheme based on Synchronized Secret Information”, AUTO-ID Labs White Paper, WPHARDWARE032, 2006. Search in Google Scholar

S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, “Security& Privacy Aspects of LowCost Radio Frequency Identification Systems, “Security in Pervasive Computing, LNCS no. 2802, pp. 201-212, 2004. Search in Google Scholar

S.E.Sarma, S.A.Weis, and D.W.Engels, “RFID systems, security and privacy implications,” in Technical Report MIT-AUTOID-WH-014, AutoID center, MIT, Cambridge, 2002. Search in Google Scholar

S.L. Garfinkel, A.Juels and R. Pappu, “RFID Privacy: An Overview of Problems and Proposed Solutions,”IEEE Security and Privacy May 2005, pp. 34-43.10.1109/MSP.2005.78 Search in Google Scholar

S.M.Lee, Y.J.Hwang, D.H.Lee, and J.I.Lim, “Efficient Authentication for Low-Cost RFID Systems, “ in International Conference on Computational Science and Its Applications, pp. 619–627, May 200510.1007/11424758_65 Search in Google Scholar

T. Dimitriou, “A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks,” in International Conference on Security and Privacy for Emerging Areas in Communication Networks, September 2005.H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4. Search in Google Scholar

J. Curtin, R. Kauffman, and F. Riggins, “Making the ‘MOST’ out of RFID technology: A research agenda for the study of the adoption, usage and impact of RFID,”Information Technology and Management, vol. 8, no. 2, 87–110. 200710.1007/s10799-007-0010-1 Search in Google Scholar

R. Das, “RFID Tag Sales in 2005—How Many and Where,”DTechEx Ltd., 2005. Search in Google Scholar

C. Heinrich, RFID and Beyond, Wiley, Indianapolis, 2005. Search in Google Scholar

H. Knospe and H. Pohl, “RFID Security,”Information Security Technical Report, vol. 9, issue 4, pp 39-50, Dec 2004.10.1016/S1363-4127(05)70039-X Search in Google Scholar

P. Peris-Lopez, J.C.Hernandez-Castro, E.T.Juan, and R. Arturo, “LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags” Workshop on RFID Security -- RFIDSec 06, July 200610.1007/11833529_93 Search in Google Scholar

CC.Tan,,B.Sheng, and Q. Li, “Serverless Search and Authentication protocols for RFID”. In: Proceedings of Pervasive Computing Conference (2006)).10.1109/PERCOM.2007.30 Search in Google Scholar

P. Peris-Lopez, J.C.Hernandez-Castro, E.T.Juan, and R. Arturo,”M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags”, Lecture Notes inComputer Science, 912--923, Springer-Verlag, Sep-2006.10.1007/11833529_93 Search in Google Scholar

P. Peris-Lopez, J.C.Hernandez-Castro, E.T.Juan, and R. Arturo, “EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags”, OTM Federated Conferences and Workshop: IS Workshop -- IS’06, 2006, 4277 Lecture Notes in Computer Science, P352--361, November Springer-Verlag.10.1007/11915034_59 Search in Google Scholar

S.Y.Kang and I.M.Lee, “A Study on Low-Cost RFID System Management with Mutual Authentication Scheme”, Ubiquitous, 2008 International Conference on Multimedia and Ubiquitous Engineering10.1109/MUE.2008.38 Search in Google Scholar

T.Li, G.Wang and R.H.Deng, “Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols”, Journal of Software, vol. 3, no. 3, March 2008.10.4304/jsw.3.3.1-10 Search in Google Scholar

X.Tao, H.Yang, R.Chen, and J.Du, “An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags”, Advanced Materials Research 1583, 2012, pp. 562-56410.4028/www.scientific.net/AMR.562-564.1583 Search in Google Scholar

J.Segura, J.G.Jordán, M.A.Jaen, F.R.Soriano, and A.Soriano, “Low Cost Identification Applications in Traffic Vehicular Environments”, in Sustainable Radio Frequency Identification Solutions, 2010.10.5772/8019 Search in Google Scholar

M.G.Gnoni, V.Elia, and A.Rollo, “RFID technology for an intelligent public transport network management”, International Journal of RF Technologies: Research and Applications, 2010,Vol. 3, No. 1 , pp.1-1310.3233/RFT-2011-014 Search in Google Scholar

G.H Hwang, K.H.Cha, S.Bhardwaj and D.S.Lee, “UHF RFID Metal Tag Applying to License Plate Using Metal Shielding and Watertight Methods”, International Journal on Smart Sensing And Intelligent Systems, Vol. 2, No. 4, pp. 549 – 56310.21307/ijssis-2017-367 Search in Google Scholar

S. Merilampi, T. Björninen, L. Sydänheimo, and L. Ukkonen, “Passive UHF RFID Strain Sensor Tag For Detecting Limb Movement”, International Journal On Smart Sensing And Intelligent Systems Vol. 5, No. 2, pp. 315 – 32810.21307/ijssis-2017-483 Search in Google Scholar

I.Syamsuddin, S.Han, T.Dillon, “A survey on low-cost RFID authentication protocols”, ICACSIS 2012 International Conference on Advanced Computer Science and Information Systems, 2012, pp. 77 – 82 Search in Google Scholar

E.G.Ahmed, E.Shaaban, M.Hashem, “Lightweight Mutual Authentication Protocol for Low Cost RFID Tags”, International Journal of Network Security& Its Applications (IJNSA), 2010, vol. 2, no. 2 , pp.27-3710.5121/ijnsa.2010.2203Search in Google Scholar

eISSN:
1178-5608
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
Volume Open
Fachgebiete der Zeitschrift:
Technik, Einführungen und Gesamtdarstellungen, andere