Accesso libero

Review on RFID Identity Authentication Protocols Based on Hash Function

INFORMAZIONI SU QUESTO ARTICOLO

Cita

Ohkubo M, Suzuki K, Kinoshta S, “Hash-chain based for-ward-secure privacy protection scheme for low-cost RFID Proceedings of the 2004 Symposium on Cryptogra-phy and Information Security. Berlin: Springer-Verlag,2004,pp.719-724.Search in Google Scholar

Sarma S, Weis S, Engels D, “RFID systems and security and privacy implications,” Proc of the 4th Int Work-shop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2002,pp. 454-469.10.1007/3-540-36400-5_33Search in Google Scholar

Weis S A, Sarma S E, Rivest R L, “et al.Security and privacy aspects of low-cost radio frequency identification systems, Proc of the 1st Security in Pervasive Com-putting.Berlin: Springer, 2003,pp.201-212.10.1007/978-3-540-39881-3_18Search in Google Scholar

Taoyuan, Zhou Xideng, “Mobile mutual authentication protocol based on hash function,” Journal of Computer Applications, 2016, 36 (3),pp.657 – 660.Search in Google Scholar

Hou Jinhuan, Ding Fuqiang, “New things RFID security protocol analysis and design of,” electronic technology and software engineering, 2015.Search in Google Scholar

Zhao Ting, Wang Jian, “Dynamic RFID authentication protocol,” 2010 Hash function of the National Communications Security Conference on.Search in Google Scholar

Guo Wei, “Improvement of HASH Chain Protocol in RFID,” second national information security protection technology conference proceedings, 2013, 6, 21.Search in Google Scholar

C. Tan, B. Sheng, and Q. Li, “Secure and serverless rfid authentication and search protocols,” vol. 7, no. 4, april 2008, pp. 1400 – 1407.10.1109/TWC.2008.061012Search in Google Scholar

Minghui Wang, Yongzheng Tang, Fang Shi, Junhua Pan, “An effective RFID authentication protocol, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp.141 – 144.10.1109/CECNet.2012.6201603Search in Google Scholar

Tan C., Sheng B., and Li Q., “Severless search and authentication protocols for RFID, In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications(PerCom ‘07), New York, USA. pp. 3-12 .Search in Google Scholar

Ahamed, S. I., Rahman, F., and Hoque, M., Kawsar, E, and Nakajima,T, “YA-SRAP: Yet another serverless RFID authentication protocol, In Proceedings of the 4th IET International Conference on Intelligent Environment (IE08). Seattle, USA. pp. 1-8,2008.10.1049/cp:20081141Search in Google Scholar

Feng Zebo, Wu Xiaoping, Liu Haohan, “RFID security authentication protocol a new free end database, Journal of Naval University of engineering, 2015,02,pp.32-36.Search in Google Scholar

Selwyn Piramuthu, “RFID mutual authentication protocols,” Decision Support Systems, Vol.50, Issue 2, January 2011, pp.387-393.10.1016/j.dss.2010.09.005Search in Google Scholar

Su Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim, “Efficient Authentication for Low-Cost RFID Systems, Lecture Notes in Computer Science. Berlin, vol.3480, pp. 619-627,2005.Search in Google Scholar

Yong Ki Lee, Ingrid Verbauwhede, “Secure and Low-cost RFID Authentication Protocols,” Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks, 2005.Search in Google Scholar

Kaleb Lee, “A Two-Step Mutual Authentication Protocol Based on Randomized Hash- Lock for Small RFID Networks, 2010 Fourth International Conference on Network and System Security, pp. 527 – 533.10.1109/NSS.2010.30Search in Google Scholar

Eun Young Choi,Su Mi Lee,Dong Hong Lee, “Efficient RFID Authentication Protocol for Ubiquitous Computing Environment, Embedded and Ubiquitous Computing, vo1.3832, pp.945-954, 2005.Search in Google Scholar

He Lei, Lu Xin-mei, Jin Song-he, Cai Zeng-yu, “A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System, 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010)[2],pp.269 – 272.10.1109/CAR.2010.5456551Search in Google Scholar

J. H. Ha, S. J. Moon, J. Y. Zhou, and J. C. Ha, “A new formal proof model for RFID location privacy, in: S. Jajodia and J. Lopez, editors, Proceedings of 13th European Symposium on Research in Computer Security–ESORICS’08, LNCS 5283, Springer–Verlag, pp. 267 – 281,2008.10.1007/978-3-540-88313-5_18Search in Google Scholar

Da-Zhi Sun, Ji-Dong Zhong, “A hash-based RFID security protocol for strong privacy protection, IEEE Transactions on Consumer Electronics (2012) Vol.58, Issue: 4, pp.1246 - 1252.Search in Google Scholar

Liang Huan qi, “Research of Mutual Authentication Protocol for RFID Based on Hash Function and Public Key, South China University of Technology, 2012.Search in Google Scholar

Jianliang Meng, Ze Wang, “A RFID Security Protocol Based on Hash Chain and Three-Way Handshake, 2013 International Conference on Computational and Information Sciences,pp.1463 – 1466.Search in Google Scholar

Yanfei Liu, Sha Feng, “Scalable Lightweight Authentication Protocol with Privacy Preservation,” 2014 Tenth International Conference on Computational Intelligence and Security, pp.474 – 478.Search in Google Scholar

T. Li, W. Luo, Z. Mo, and S. Chen, “Privacy-preserving RFID authentication based on cryptographical encoding,” IEEE INFOCOM,2012, pp. 2174-2182.Search in Google Scholar

G. Avoine, L. Buttyan, T. Holczer, and I. Vajda, “Group-Based Private Authentication,” IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, 2007, pp. 1-6.10.1109/WOWMOM.2007.4351808Search in Google Scholar

Prosanta Gope and Tzonelih Hwang, “A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system, Computers & Security, Vol.55, November 2015, pp.271-280.10.1016/j.cose.2015.05.004Search in Google Scholar

Prajnamaya Dass, Hari Om, “A secure authentication scheme for RFID Systems,” Procedia Computer Science, Vol.78, 2016, pp. 100-106.10.1016/j.procs.2016.02.017Search in Google Scholar

Jung-Sik Cho, Young-Sik Jeong and Sang Oh Park, “Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol, Computers & Mathematics with Applications, Vol.69, Issue 1, January 2015, pp. 58-65.10.1016/j.camwa.2012.02.025Search in Google Scholar

Dang Nguyen Duc and Kwangjo Kim, “Defending. RFID authentication protocols against DoS attacks, Computer Communications, Vol.34, Issue 3, 15 March 2011, pp. 384-390.10.1016/j.comcom.2010.06.014Search in Google Scholar

eISSN:
2470-8038
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, other