{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:40:55Z","timestamp":1763642455461,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,8,16]],"date-time":"2018-08-16T00:00:00Z","timestamp":1534377600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11227-018-2538-8","type":"journal-article","created":{"date-parts":[[2018,8,15]],"date-time":"2018-08-15T22:13:56Z","timestamp":1534371236000},"page":"6220-6235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Implementation of secret disclosure attack against two IoT lightweight authentication protocols"],"prefix":"10.1007","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1897-0828","authenticated-orcid":false,"given":"Masoumeh","family":"Safkhani","sequence":"first","affiliation":[]},{"given":"Mahyar","family":"Shariat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,16]]},"reference":[{"key":"2538_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/s11227-017-2139-y","volume":"74","author":"SF Aghili","year":"2017","unstructured":"Aghili SF, Ashouri-Talouki M, Mala H (2017) DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IOT. J Supercomput 74:509\u2013525","journal-title":"J Supercomput"},{"key":"2538_CR2","unstructured":"Aghili SF, Mala H (2017) Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce. Technical Report, IACR Cryptology ePrint Archive 2017:547"},{"issue":"4","key":"2538_CR3","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347\u20132376 (Fourthquarter)","journal-title":"IEEE Commun Surv Tutor"},{"key":"2538_CR4","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","volume":"78","author":"R Amin","year":"2018","unstructured":"Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005\u20131019","journal-title":"Future Gener Comput Syst"},{"key":"2538_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1107-x","author":"W-S Bae","year":"2017","unstructured":"Bae W-S (2017) Verifying a secure authentication protocol for IoT medical devices. Cluster Comput. \n                    https:\/\/doi.org\/10.1007\/s10586-017-1107-x","journal-title":"Cluster Comput"},{"key":"2538_CR6","doi-asserted-by":"crossref","unstructured":"Beaulieu R, Treatman-Clark S, Shors D, Weeks B, Smith J, Wingers L (2015) The SIMON and SPECK lightweight block ciphers. In: Design Automation Conference (DAC), 2015 52nd ACM\/EDAC\/IEEE. IEEE, pp 1\u20136","DOI":"10.1145\/2744769.2747946"},{"key":"2538_CR7","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-662-53008-5_5","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"Christof Beierle","year":"2016","unstructured":"Beierle C, Jean J, K\u00f6lbl S, Leander G, Moradi A, Peyrin T, Sasaki Y, Sasdrich P, Sim SM (2016) The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw M, Katz J (eds) Advances in Cryptology\u2014CRYPTO 2016\u201436th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14\u201318 Aug 2016, Proceedings, Part II, Volume 9815 of Lecture Notes in Computer Science. Springer, pp 123\u2013153"},{"key":"2538_CR8","doi-asserted-by":"crossref","unstructured":"Bilal Z, Masood A, Kausar F (2009) Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol. In: International Conference on Network-Based Information Systems, 2009. NBIS\u201909. IEEE, pp 260\u2013267","DOI":"10.1109\/NBiS.2009.9"},{"key":"2538_CR9","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen L.R, Leander G, Paar C, Poschmann A, Robshaw M.J, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: CHES, vol 4727. Springer, pp 450\u2013466","DOI":"10.1007\/978-3-540-74735-2_31"},{"issue":"1","key":"2538_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TDSC.2008.32","volume":"6","author":"T Cao","year":"2009","unstructured":"Cao T, Bertino E, Lei H (2009) Security analysis of the SASI protocol. IEEE Trans Dependable Secure Comput 6(1):73\u201377","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"2538_CR11","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"H-Y Chien","year":"2007","unstructured":"Chien H-Y (2007) SASI: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secure Comput 4(4):337\u2013340","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2538_CR12","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/s12083-016-0443-6","volume":"10","author":"K Fan","year":"2017","unstructured":"Fan K, Ge N, Gong Y, Li H, Su R, Yang Y (2017) An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw Appl 10:368\u2013376","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"16","key":"2538_CR13","doi-asserted-by":"publisher","first-page":"3095","DOI":"10.1002\/sec.1314","volume":"9","author":"K Fan","year":"2016","unstructured":"Fan K, Gong Y, Liang C, Li H, Yang Y (2016) Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur Commun Netw 9(16):3095\u20133104","journal-title":"Secur Commun Netw"},{"key":"2538_CR14","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s12083-017-0553-9","volume":"11","author":"K Fan","year":"2017","unstructured":"Fan K, Wang W, Jiang W, Li H, Yang Y (2017) Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Netw Appl 11:723\u2013734","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"2538_CR15","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/JIOT.2016.2624824","volume":"4","author":"R Giuliano","year":"2017","unstructured":"Giuliano R, Mazzenga F, Neri A, Vegni AM (2017) Security access protocols in IoT capillary networks. IEEE Internet Things J 4(3):645\u2013657","journal-title":"IEEE Internet Things J"},{"key":"2538_CR16","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/j.future.2017.06.023","volume":"83","author":"P Gope","year":"2017","unstructured":"Gope P, Amin R, Islam SH, Kumar N, Bhalla VK (2017) Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener Comput Syst 83:629\u2013637","journal-title":"Future Gener Comput Syst"},{"key":"2538_CR17","unstructured":"Hernandez-Castro JC, Tapiador JM, Peris-Lopez P, Quisquater J-J (2008) Cryptanalysis of the sasi ultralightweight RFID authentication protocol with modular rotations. arXiv preprint \n                    arXiv:0811.4257"},{"key":"2538_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.035","author":"MA Jan","year":"2017","unstructured":"Jan MA, Khan F, Alam M, Usman M (2017) A payload-based mutual authentication scheme for Internet of Things. Future Gener Comput Syst. \n                    https:\/\/doi.org\/10.1016\/j.future.2017.08.035","journal-title":"Future Gener Comput Syst"},{"key":"2538_CR19","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on Internet of Things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4:1125\u20131142","journal-title":"IEEE Internet Things J"},{"key":"2538_CR20","unstructured":"Peris-Lopez P, Hernandez-Castro JC, Tapiador JM, Ribagorda A (2008) Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In: International Workshop on Information Security Applications. Springer, pp 56\u201368"},{"issue":"4","key":"2538_CR21","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2008.33","volume":"6","author":"RC-W Phan","year":"2009","unstructured":"Phan RC-W (2009) Cryptanalysis of a new ultralightweight RFID authentication protocol SASI. IEEE Trans Dependable Secure Comput 6(4):316\u2013320","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2538_CR22","doi-asserted-by":"crossref","unstructured":"Ronen E, Shamir A, Weingarten AO, O\u2019Flynn C (2017) Iot goes nuclear: creating a ZigBee chain reaction. In: 2017 IEEE Symposium on Security and Privacy (SP), pp 195\u2013212","DOI":"10.1109\/SP.2017.14"},{"key":"2538_CR23","unstructured":"Safkhani M, Bagheri N (2016) Generalized desynchronization attack on UMAP: application to RCIA, KMAP, SLAP and SASI\n                    \n                      \n                    \n                    $$^+$$\n                    \n                      \n                        \n                          \n                          +\n                        \n                      \n                    \n                   protocols. IACR Cryptology ePrint Archive 2016:905"},{"issue":"8","key":"2538_CR24","doi-asserted-by":"publisher","first-page":"3579","DOI":"10.1007\/s11227-017-1959-0","volume":"73","author":"M Safkhani","year":"2017","unstructured":"Safkhani M, Bagheri N (2017) Passive secret disclosure attack on an ultralightweight authentication protocol for internet of things. J Supercomput 73(8):3579\u20133585","journal-title":"J Supercomput"},{"key":"#cr-split#-2538_CR25.1","unstructured":"Safkhani M, Bagheri N, Hosseinzadeh M, Namin ME, Rostampour S (2015) On the"},{"key":"#cr-split#-2538_CR25.2","unstructured":"(im) possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et al. protocol. IACR Cryptology ePrint Archive 2015:365"},{"key":"2538_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3313","author":"M Safkhani","year":"2017","unstructured":"Safkhani M, Bagheri N, Hosseinzadeh M, Namin ME, Rostampour S (2017) On the security of an RFID-based parking lot management system. Int J Commun Syst. \n                    https:\/\/doi.org\/10.1002\/dac.3313","journal-title":"Int J Commun Syst"},{"issue":"1","key":"2538_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LES.2016.2630729","volume":"9","author":"S Sciancalepore","year":"2017","unstructured":"Sciancalepore S, Piro G, Boggia G, Bianchi G (2017) Public key authentication and key agreement in IoT devices with minimal airtime consumption. IEEE Embed Syst Lett 9(1):1\u20134","journal-title":"IEEE Embed Syst Lett"},{"key":"2538_CR28","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2016.11.033","volume":"78","author":"J Shen","year":"2018","unstructured":"Shen J, Chang S, Shen J, Liu Q, Sun X (2018) A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener Comput Syst 78:956\u2013963","journal-title":"Future Gener Comput Syst"},{"key":"2538_CR29","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of Things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"key":"2538_CR30","doi-asserted-by":"crossref","unstructured":"Song B, Cheong Y, Lee T, Jeong J (2017) Design and security analysis of improved identity management protocol for 5G\/IoT networks. In: World Conference on Information Systems and Technologies. Springer, pp 311\u2013320","DOI":"10.1007\/978-3-319-56538-5_32"},{"issue":"2","key":"2538_CR31","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/TDSC.2009.26","volume":"8","author":"H-M Sun","year":"2011","unstructured":"Sun H-M, Ting W-C, Wang K-H (2011) On the security of Chien\u2019s ultralightweight rfid authentication protocol. IEEE Trans Dependable Secure Comput 8(2):315\u2013317","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"7","key":"2538_CR32","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1353-4858(17)30071-5","volume":"2017","author":"M Taylor","year":"2017","unstructured":"Taylor M, Reilly D, Lempereur B (2017) An access control management protocol for Internet of Things devices. Netw Secur 2017(7):11\u201317","journal-title":"Netw Secur"},{"key":"2538_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.010","author":"FA Teixeira","year":"2017","unstructured":"Teixeira FA, Pereira FMQ, Wong H-C, Nogueira JMS, Oliveira LB (2017) SIoT: securing Internet of Things through distributed systems analysis. Future Gener Comput Syst. \n                    https:\/\/doi.org\/10.1016\/j.future.2017.08.010","journal-title":"Future Gener Comput Syst"},{"issue":"3","key":"2538_CR34","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","volume":"73","author":"A Tewari","year":"2017","unstructured":"Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085\u20131102","journal-title":"J Supercomput"},{"key":"2538_CR35","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11227-017-2105-8","volume":"74","author":"K-H Wang","year":"2017","unstructured":"Wang K-H, Chen C-M, Fang W, Wu T-Y (2017) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74:65\u201370","journal-title":"J Supercomput"},{"issue":"1","key":"2538_CR36","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11227-017-2105-8","volume":"74","author":"K-H Wang","year":"2018","unstructured":"Wang K-H, Chen C-M, Fang W, Wu T-Y (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74(1):65\u201370","journal-title":"J Supercomput"},{"key":"2538_CR37","doi-asserted-by":"publisher","first-page":"1634","DOI":"10.1109\/JIOT.2017.2706752","volume":"4","author":"M Wazid","year":"2017","unstructured":"Wazid M, Das AK, Khan MK, Al-Ghaiheb AA-D, Kumar N, Vasilakos A (2017) Secure authentication scheme for medicine anti-counterfeiting system in IoT environment. IEEE Internet Things J 4:1634\u20131646","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"2538_CR38","doi-asserted-by":"publisher","first-page":"2418","DOI":"10.1109\/TII.2017.2768075","volume":"14","author":"G Xie","year":"2018","unstructured":"Xie G, Chen Y, Li R, Li K (2018) Hardware cost design optimization for functional safety-critical parallel applications on heterogeneous distributed embedded systems. IEEE Trans Ind Inform 14(6):2418\u20132431","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"2538_CR39","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TR.2017.2778070","volume":"67","author":"G Xie","year":"2018","unstructured":"Xie G, Chen Y, Liu Y, Li R, Li K (2018) Minimizing development cost with reliability goal for automotive functional safety during design phase. IEEE Trans Reliab 67(1):196\u2013211","journal-title":"IEEE Trans Reliab"},{"issue":"11","key":"2538_CR40","doi-asserted-by":"publisher","first-page":"9623","DOI":"10.1109\/TVT.2017.2737035","volume":"66","author":"G Xie","year":"2017","unstructured":"Xie G, Zeng G, Kurachi R, Takada H, Li Z, Li R, Li K (2017) WCRT analysis of can messages in gateway-integrated in-vehicle networks. IEEE Trans Veh Technol 66(11):9623\u20139637","journal-title":"IEEE Trans Veh Technol"},{"issue":"8","key":"2538_CR41","doi-asserted-by":"publisher","first-page":"6676","DOI":"10.1109\/TVT.2017.2674302","volume":"66","author":"G Xie","year":"2017","unstructured":"Xie G, Zeng G, Li Z, Li R, Li K (2017) Adaptive dynamic scheduling on multi-functional mixed-criticality automotive cyber-physical systems. IEEE Trans Veh Technol 66(8):6676\u20136692","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"2538_CR42","doi-asserted-by":"publisher","first-page":"4378","DOI":"10.1109\/TIE.2017.2762621","volume":"65","author":"G Xie","year":"2018","unstructured":"Xie G, Zeng G, Liu Y, Zhou J, Li R, Li K (2018) Fast functional safety verification for distributed automotive applications during early design phase. IEEE Trans Ind Electrons 65(5):4378\u20134391","journal-title":"IEEE Trans Ind Electrons"},{"issue":"1","key":"2538_CR43","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TITS.2017.2749977","volume":"19","author":"C Yan","year":"2018","unstructured":"Yan C, Xie H, Liu S, Yin J, Zhang Y, Dai Q (2018) Effective Uyghur language text detection in complex background images for traffic prompt identification. IEEE Trans Intell Transport Syst 19(1):220\u2013229","journal-title":"IEEE Trans Intell Transport Syst"},{"issue":"1","key":"2538_CR44","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TITS.2017.2749965","volume":"19","author":"C Yan","year":"2018","unstructured":"Yan C, Xie H, Yang D, Yin J, Zhang Y, Dai Q (2018) Supervised hash coding with deep neural network for environment perception of intelligent vehicles. IEEE Trans Intell Transport Syst 19(1):284\u2013295","journal-title":"IEEE Trans Intell Transport Syst"},{"issue":"5","key":"2538_CR45","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/LSP.2014.2310494","volume":"21","author":"C Yan","year":"2014","unstructured":"Yan C, Zhang Y, Xu J, Dai F, Li L, Dai Q, Wu F (2014) A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors. IEEE Signal Process Lett 21(5):573\u2013576","journal-title":"IEEE Signal Process Lett"},{"issue":"12","key":"2538_CR46","doi-asserted-by":"publisher","first-page":"2077","DOI":"10.1109\/TCSVT.2014.2335852","volume":"24","author":"C Yan","year":"2014","unstructured":"Yan C, Zhang Y, Xu J, Dai F, Zhang J, Dai Q, Wu F (2014) Efficient parallel framework for HEVC motion estimation on many-core processors. IEEE Trans Circuits Syst Video Technol 24(12):2077\u20132089","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"1","key":"2538_CR47","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","volume":"55","author":"J Zhou","year":"2017","unstructured":"Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag 55(1):26\u201333","journal-title":"IEEE Commun Mag"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2538-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2538-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2538-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T19:06:23Z","timestamp":1565895983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2538-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,16]]},"references-count":48,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["2538"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2538-8","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2018,8,16]]},"assertion":[{"value":"16 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}