A Lightweight Inter-Zonal Authentication Protocol for Moving Objects in Low Powered RF Systems
Abstract
Full Text:
PDFReferences
Niu, Haifeng, Eyad Taqieddin, Sarangapani Jagannathan. EPC Gen2v2 RFID standard authentication and ownership management protocol. IEEE Transactions on Mobile Computing. 2016: 15(1): 137-149.
Zhang, Changlun, Wenqi Zhang, Haibing Mu. A mutual authentication security RFID protocol based on time stamp. Computational Intelligence Theory, Systems and Applications (CCITSA), 2015 First International Conference on. IEEE, 2015.
Hermans, Jens, Roel Peeters, Bart Preneel. Proper RFID privacy: model and protocols. IEEE Transactions on Mobile Computing 2014;13(12): 2888-2902.
Dharuman, Lavanya, Senthilkumar Mathi. A Time-invariant Scheme for Handover Key Management Using Identity based Encryption in 4G LTE Networks. Int. J. Contr. Theor. App. 2015; 8(5): 1823-1830.
Mathi, Senthil Kumar, M L Valarmathi. An efficacious and secure registration for internet protocol mobility. Defence Science Journal. 2013; 63(5): 502-507.
Mathi, Senthilkumar, Lavanya Dharuman. Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme. Procedia Computer Science. 2016; 89: 170-179.
Rahman, Musfiq, Raghav V. Sampangi, Srinivas Sampalli. Lightweight protocol for anonymity and mutual authentication in RFID systems. Consumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE. IEEE, 2015.
Pedro Peris-Lopez, et al. Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. International Workshop on Information Security Applications. Springer. 2008.
D'Arco, Paolo, Alfredo De Santis. On ultralightweight RFID authentication protocols. IEEE Transactions on Dependable and Secure Computing. 2011; 8(4): 548-563.
Tian, Yun, Gongliang Chen, Jianhua Li. A new ultralightweight RFID authentication protocol with permutation." IEEE Communications Letters. 2012; 16(5): 702-705.
Ahmed Eslam Gamal, Eman Shaaban, Mohamed Hashem. Lightweight mutual authentication protocol for low cost RFID tags. arXiv preprint arXiv:1005.4499 (2010).
Grimaila Michael. RFID security concerns. ISSA Journal. 2007: 30-35.
Ari Juels. RFID security and privacy: A research survey. IEEE journal on selected areas in communications. 2006; 24(2): 381-394.
Avery Williamson, et al. Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia 2013; 4: 282-287.
Amit Grover, Hal Berghel. A survey of RFID deployment and security issues. Journal of Information Processing Systems. 2011; 7(4): 561-580.
Shih, Dong-Her, Chin-Yi Lin, Binshan Lin. RFID tags: privacy and security aspects. International Journal of Mobile Communications. 2005; 3(3): 214-230.
Burmester, Mike, Breno De Medeiros. RFID security: attacks, countermeasures and challenges. The 5th RFID Academic Convocation, the RFID Journal Conference. 2007.
Osaka, Kyosuke, et al. An efficient and secure RFID security method with ownership transfer. RFID security. Springer US, pp. 147-176, 2008.
Litian, Duan, Duan Fu, Wang John Zizhong. A Mixed and Batching Authentication Protocol for Grouped Tags in Mobile RFID System. Data Science and Data Intensive Systems (DSDIS), 2015 IEEE International Conference on. IEEE, 2015.
Chien, Hung-Yu, Che-Hao Chen. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces. 2007; 29(2): 254-259.
David, Mathieu, Neeli R Prasad. Providing strong security and high privacy in low-cost RFID networks. Security and privacy in mobile information and communication systems, 2009: 172-179.
Jiang, Yi, Wei Cheng, Xiaojiang Du. Group-based key array authentication protocol in radio frequency identification systems. IET Information Security 2014; 8(6): 290-296.
Lu, Li, et al. Dynamic key-updating: Privacy-preserving authentication for RFID systems. Pervasive Computing and Communications, 2007. PerCom'07. Fifth Annual IEEE International Conference on. IEEE. 2007: 13-22.
Kapoor, Gaurav, Selwyn Piramuthu. Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 2012; 42(2): 164-173.
Chen, Hsing-Bai, et al. Enhancement of the RFID security method with ownership transfer. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. ACM, 2009.
Juels, Ari, Stephen A Weis. Authenticating pervasive devices with human protocols. Crypto. 2005; 3621.
Lu, Li, et al. Dynamic key-updating: Privacy-preserving authentication for RFID systems. Pervasive Computing and Communications, 2007. PerCom'07. Fifth Annual IEEE International Conference on. IEEE. 2007: 13-22.
Kaps, Jens-Peter. Chai-Tea, Cryptographic Hardware Implementations of xTEA. INDOCRYPT. 2008.
Wheeler, D, R Needham. TEA extensions (October 1997), Also Correction to XTEA (October 1998). Available via: www. ftp. cl. cam. ac. uk/ftp/users/djw3.
Lamport, Leslie. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM. 1978; 21(7): 558-565.
Gui, Yi-Qi, Jie Zhang, Hwang Kyu Choi. An improved RFID security method with ownership transfer. ICT Convergence (ICTC), 2011 International Conference on. IEEE. 2011: 594-596.
DOI: https://doi.org/10.11591/APTIKOM.J.CSIT.69
Refbacks
- There are currently no refbacks.
Copyright (c) 2019 APTIKOM Journal on Computer Science and Information Technologies
ISSN: 2722-323X, e-ISSN: 2722-3221
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.