JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (5): 52-76.doi: 10.6040/j.issn.1671-9352.2.2018.079
• • Previous Articles Next Articles
Xin-min DAI1(),Xiao-yao XIE2,*()
CLC Number:
1 | PANG L J, HE L W, PEI Q Q, et al. Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard[C]//2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai: IEEE, 2013: 1870-1875. |
2 |
WANG S H , LIU S J , CHEN D W . Security analysis and improvement on two RFID authentication protocols[J]. Wireless Personal Communications, 2015, 82 (1): 21- 33.
doi: 10.1007/s11277-014-2189-x |
3 |
SAFKHANI M , HOSSEINZADEH M , NAMIN M E , et al. On the (Im)possibility of receiving security beyond 2l using an l-bit PRNG[J]. Wireless Personal Communications, 2017, 92 (4): 1591- 1597.
doi: 10.1007/s11277-016-3623-z |
4 | XIAO F , ZHOU Y J , ZHOU J X , et al. Security protocol for RFID system conforming to EPC-C1 G2 standards[J]. Journal of Computers, 2013, 8 (3): 605- 612. |
5 | ABDOLMALEKI B, BAGHERY K, AKHBARI B, et al. Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard[C]//2016 8th International Symposium on Telecommunications (IST), Iran:IEEE, 2016:111-116. |
6 | DELVAUX J , PEETERS R , GU D W , et al. A survey on lightweight entity authentication with strong PUFs[J]. ACM Computing Surveys, 2015, 48 (2): 1- 42. |
7 | BOLOTNYY L, ROBINS G. Physically unclonable function-based security and privacy in RFID systems[C]//Fifth Annual IEEE International Conference on Pervasive Computing and Communications. New York: IEEE, 2007: 211-220. |
8 | KULSENG L, YU Z, WEI Y W, et al. Lightweight mutual authentication and ownership transfer for RFID systems[C]//2010 Proceedings IEEE INFOCOM Conference. San Diego: IEEE, 2010: 1-5. |
9 | KARDAS S, AKGÜN M, KIRAZ M S, et al. Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems[C]//2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications. Istanbul: IEEE, 2011: 20-25. |
10 | BASSIL R, EL-BEAINO W, KAYSSI A, et al. A PUF-based ultra-lightweight mutual-authentication RFID protocol[C]//Internet Technology and Secured Transactions (ICITST). New York: IEEE, 2011: 495-499. |
11 |
李晖, 夏伟, 邓冠阳, 等. 超轻量级双向认证协议PUMAP的安全性分析[J]. 北京理工大学学报, 2013, 33 (12): 1259- 1262.
doi: 10.3969/j.issn.1001-0645.2013.12.010 |
LI Hui , XIA Wei , DENG Guanyang , et al. Security analysis of a PUF based ultra-lightweight mutual authentication RFID protocol-PUMAP[J]. Transactions of Beijing Institute of Technology, 2013, 33 (12): 1259- 1262.
doi: 10.3969/j.issn.1001-0645.2013.12.010 |
|
12 |
徐旭光, 欧毓毅, 凌捷, 等. 基于PUF的轻量级RFID安全认证协议[J]. 计算机应用与软件, 2014, 31 (11): 302- 306.
doi: 10.3969/j.issn.1000-386x.2014.11.077 |
XU Xuguang , OU Yuyi , LING Jie , et al. Lightweight rfid secure authentication protocol based on puf[J]. Computer Applications and Software, 2014, 31 (11): 302- 306.
doi: 10.3969/j.issn.1000-386x.2014.11.077 |
|
13 | 寇红召, 张紫楠, 马骏, 等. 基于物理不可克隆函数的RFID双除认证[J]. 计算机工程, 2013, 39 (6): 142- 145. |
KOU Hongzhao , ZHANG Zinan , MA Jun , et al. RFID mutual authentication based on physical unclonable function[J]. Computer Engineering, 2013, 39 (6): 142- 145. | |
14 | 柳毅, 顾国生. 一种新的轻量级RFID双向认证协议[J]. 计算机科学, 2017, 44 (2): 206- 208, 227. |
LIU Yi , GU Guosheng . New mutual authentication for lightweight RFID protocols[J]. Computer Science, 2017, 44 (2): 206- 208, 227. | |
15 | THAYER FÁBREGA F J , HERZOG J C , GUTTMAN J D . Strand spaces: proving security protocols correct[J]. Journal of Computer Security, 1999, 7 (2/3): 191- 230. |
16 | THAYER F F J, HERZOG J C, GUTTMAN J D. Honest ideals on strand spaces[C]//Proceedings of 11th IEEE ComputerSecurity Foundations Workshop. Rockport: IEEE, 1998: 66-77. |
[1] | MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong. Survey of security analysis of security protocol implementations [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 1-18. |
[2] | WANG Xu-yu, JING Feng-xuan, WANG Yu-qing. An improved hash-based RFID security authentication algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 154-159. |
[3] | RAO Xu-li1, ZHANG Mei-ping2, XU Li2. The RFID card reader system design based on Zigbee technology [J]. J4, 2013, 48(7): 62-67. |
[4] | RAO Xu-li1, ZHANG Mei-ping2, MA Xian-hu2. Design of laboratory equipment monitoring management system based on the internet of things [J]. J4, 2012, 47(11): 74-77. |
|