{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:17:30Z","timestamp":1742912250340,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030736880"},{"type":"electronic","value":"9783030736897"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-73689-7_83","type":"book-chapter","created":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T11:29:51Z","timestamp":1618486191000},"page":"880-890","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secret Disclosure Attacks on a Recent Ultralightweight Mutual RFID Authentication Protocol for Blockchain-Enabled Supply Chains"],"prefix":"10.1007","author":[{"given":"Paolo","family":"D\u2019Arco","sequence":"first","affiliation":[]},{"given":"Zahra Ebadi","family":"Ansaroudi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,16]]},"reference":[{"issue":"7","key":"83_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ipl.2013.01.003","volume":"113","author":"Z Ahmadian","year":"2013","unstructured":"Ahmadian, Z., Salmasizadeh, M., Aref, M.R.: Desynchronization attack on RAPP ultralightweight authentication protocol. Inf. Process. Lett. 113(7), 205\u2013209 (2013)","journal-title":"Inf. Process. Lett."},{"key":"83_CR2","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., H\u00e9am, P.C., Kouchnarenko, O., Mantovani, J., et\u00a0al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: International Conference on Computer Aided Verification, pp. 281\u2013285. Springer (2005)","DOI":"10.1007\/11513988_27"},{"issue":"9","key":"83_CR3","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1109\/TMC.2015.2492553","volume":"15","author":"G Avoine","year":"2015","unstructured":"Avoine, G., Carpent, X., Hernandez-Castro, J.: Pitfalls in ultralightweight authentication protocol designs. IEEE Trans. Mob. Comput. 15(9), 2317\u20132332 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"6","key":"83_CR4","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.clsr.2007.09.005","volume":"23","author":"J Ayoade","year":"2007","unstructured":"Ayoade, J.: Roadmap to solving security and privacy concerns in RFID systems. Comput. Law Secur. Rev. 23(6), 555\u2013561 (2007)","journal-title":"Comput. Law Secur. Rev."},{"key":"83_CR5","doi-asserted-by":"crossref","unstructured":"Bilal, Z., Martin, K.: Ultra-lightweight mutual authentication protocols: weaknesses and countermeasures. In: 2013 International Conference on Availability, Reliability and Security, pp. 304\u2013309. IEEE (2013)","DOI":"10.1109\/ARES.2013.41"},{"key":"83_CR6","doi-asserted-by":"crossref","unstructured":"Bilal, Z., Masood, A., Kausar, F.: Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol. In: 2009 International Conference on Network-Based Information Systems, pp. 260\u2013267. IEEE (2009)","DOI":"10.1109\/NBiS.2009.9"},{"issue":"4","key":"83_CR7","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"HY Chien","year":"2007","unstructured":"Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4), 337\u2013340 (2007)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"83_CR8","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/1278901.1278916","volume":"41","author":"HY Chien","year":"2007","unstructured":"Chien, H.Y., Huang, C.W.: Security of ultra-lightweight RFID authentication protocols and its improvements. ACM SIGOPS Oper. Syst. Rev. 41(4), 83\u201386 (2007)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"83_CR9","doi-asserted-by":"crossref","unstructured":"D\u2019Arco, P.: Ultralightweight cryptography. In: International Conference on Security for Information Technology and Communications, pp. 1\u201316. Springer (2018)","DOI":"10.1007\/978-3-030-12942-2_1"},{"key":"83_CR10","doi-asserted-by":"crossref","unstructured":"D\u2019Arco, P., De\u00a0Prisco, R.: Design weaknesses in recent ultralightweight RFID authentication protocols. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 3\u201317. Springer (2018)","DOI":"10.1007\/978-3-319-99828-2_1"},{"issue":"4","key":"83_CR11","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1109\/TDSC.2010.75","volume":"8","author":"P D\u2019Arco","year":"2010","unstructured":"D\u2019Arco, P., De Santis, A.: On ultralightweight RFID authentication protocols. IEEE Trans. Dependable Secure Comput. 8(4), 548\u2013563 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"83_CR12","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"SL Garfinkel","year":"2005","unstructured":"Garfinkel, S.L., Juels, A., Pappu, R.: RFID privacy: an overview of problems and proposed solutions. IEEE Secur. Privacy 3(3), 34\u201343 (2005)","journal-title":"IEEE Secur. Privacy"},{"key":"83_CR13","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R.M., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: IEEE Symposium on Security and Privacy, pp. 234\u2013248. Citeseer (1990)","DOI":"10.1109\/RISP.1990.63854"},{"key":"83_CR14","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","volume":"78","author":"MT Hammi","year":"2018","unstructured":"Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78, 126\u2013142 (2018)","journal-title":"Comput. Secur."},{"issue":"11","key":"83_CR15","doi-asserted-by":"publisher","first-page":"7081","DOI":"10.1109\/TII.2019.2942389","volume":"16","author":"S Jangirala","year":"2019","unstructured":"Jangirala, S., Das, A.K., Vasilakos, A.V.: Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment. IEEE Trans. Industr. Inf. 16(11), 7081\u20137093 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"83_CR16","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2018.05.005","volume":"116","author":"C Lin","year":"2018","unstructured":"Lin, C., He, D., Huang, X., Choo, K.K.R., Vasilakos, A.V.: BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 116, 42\u201352 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"8","key":"83_CR17","doi-asserted-by":"publisher","first-page":"2575","DOI":"10.3390\/s18082575","volume":"18","author":"A Panarello","year":"2018","unstructured":"Panarello, A., Tapas, N., Merlino, G., Longo, F., Puliafito, A.: Blockchain and IoT integration: a systematic survey. Sensors 18(8), 2575 (2018)","journal-title":"Sensors"},{"key":"83_CR18","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: OTM Confederated International Conferences \u201cOn the Move to Meaningful Internet Systems\u201d, pp. 352\u2013361. Springer (2006)","DOI":"10.1007\/11915034_59"},{"key":"83_CR19","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Est\u00e9vez-Tapiador, J.M., Ribagorda, A.: LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of 2nd Workshop on RFID Security, vol.\u00a06 (2006)","DOI":"10.1007\/11833529_93"},{"key":"83_CR20","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M$$^2$$AP: a minimalist mutual-authentication protocol for low-cost RFID tags. In: International Conference on Ubiquitous Intelligence and Computing, pp. 912\u2013923. Springer (2006)","DOI":"10.1007\/11833529_93"},{"key":"83_CR21","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID systems: a survey on security threats and proposed solutions. In: IFIP International Conference on Personal Wireless Communications, pp. 159\u2013170. Springer (2006)","DOI":"10.1007\/11872153_14"},{"key":"83_CR22","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Phan, R.C.W., Tapiador, J.M., Li, T.: Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol. In: International Conference on Information Security and Cryptology, pp. 427\u2013442. Springer (2010)","DOI":"10.1007\/978-3-642-21518-6_30"},{"key":"83_CR23","unstructured":"Safkhani, M., Bagheri, N.: Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT. arXiv preprint arXiv:1907.11322 (2019)"},{"key":"83_CR24","doi-asserted-by":"publisher","first-page":"7273","DOI":"10.1109\/ACCESS.2018.2890389","volume":"7","author":"M Sidorov","year":"2019","unstructured":"Sidorov, M., Ong, M.T., Sridharan, R.V., Nakamura, J., Ohmura, R., Khor, J.H.: Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains. IEEE Access 7, 7273\u20137285 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"83_CR25","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/TDSC.2009.26","volume":"8","author":"HM Sun","year":"2009","unstructured":"Sun, H.M., Ting, W.C., Wang, K.H.: On the security of Chien\u2019s ultralightweight RFID authentication protocol. IEEE Trans. Dependable Secure Comput. 8(2), 315\u2013317 (2009)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"83_CR26","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11227-017-2105-8","volume":"74","author":"KH Wang","year":"2018","unstructured":"Wang, K.H., Chen, C.M., Fang, W., Wu, T.Y.: On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J. Supercomput. 74(1), 65\u201370 (2018)","journal-title":"J. Supercomput."},{"key":"83_CR27","doi-asserted-by":"crossref","unstructured":"Wang, S., Zhu, S., Zhang, Y.: Blockchain-based mutual authentication security protocol for distributed RFID systems. In: 2018 IEEE Symposium on Computers and Communications (ISCC), pp. 00074\u201300077. IEEE (2018)","DOI":"10.1109\/ISCC.2018.8538567"},{"key":"83_CR28","doi-asserted-by":"crossref","unstructured":"Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview. arXiv preprint arXiv:1906.11078 (2019)","DOI":"10.6028\/NIST.IR.8202"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-73689-7_83","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T14:41:33Z","timestamp":1618497693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-73689-7_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030736880","9783030736897"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-73689-7_83","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"16 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SoCPaR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socpar2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/socpar20\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}