{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T21:52:50Z","timestamp":1772574770140,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,9,18]],"date-time":"2013-09-18T00:00:00Z","timestamp":1379462400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s11265-013-0844-1","type":"journal-article","created":{"date-parts":[[2013,9,17]],"date-time":"2013-09-17T05:59:00Z","timestamp":1379397540000},"page":"271-283","source":"Crossref","is-referenced-by-count":6,"title":["Attacks on Recent RFID Authentication Protocols"],"prefix":"10.1007","volume":"79","author":[{"given":"Mohammad Hassan","family":"Habibi","sequence":"first","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,18]]},"reference":[{"key":"844_CR1","unstructured":"Alomair, B., Lazos, L., Poovendran, R. (2007). Passive attacks 849 on a class of authentication protocols for RFID. In K.-H. Nam & G. Rhee (Eds.), ICISC 2007. LNCS (Vol. 4817, pp. 10215). Springer."},{"key":"844_CR2","doi-asserted-by":"crossref","unstructured":"Avoine, G., & Oechslin, P. (2005). A scalable and provably secure hash based RFID protocol. In Proceedings of international work- shop on pervasive computing and communication security-persec 2005, (pp. 110114). IEEE Computer Society Press.","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"844_CR3","unstructured":"Avoine, G. (2005). Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005\/049. http:\/\/eprint.iacr.org\/2005\/049 ."},{"key":"844_CR4","unstructured":"Avoine, G. (2005). Cryptography in radio frequency identification and fair ex-change protocols. PhD thesis no. 3407, EPFL. http:\/\/library.epfl.ch\/theses\/?nr=3407 ."},{"key":"844_CR5","first-page":"291","volume-title":"SAC 2005. LNCS, Vol 3897","author":"G Avoine","year":"2006","unstructured":"Avoine, G., Dysli, E., Oechslin, P. (2006). Reducing time complexity in RFID systems. In B. Preneel & S. Tavares (Eds.), SAC 2005. LNCS (Vol. 3897, pp. 291\u2013306). Heidelberg: Springer."},{"key":"844_CR6","first-page":"125","volume-title":"FC 2005. LNCS, Vol 3570","author":"G Avoine","year":"2005","unstructured":"Avoine, G., & Oechslin, P. (2005). RFID traceability: A multilayer problem. In A.S. Patrick & Yung, M. (Eds.), FC 2005. LNCS (Vol. 3570, pp. 125\u2013140). Heidelberg: Springer."},{"key":"844_CR7","doi-asserted-by":"crossref","DOI":"10.1002\/9780470168226","volume-title":"RFID applied","author":"J Banks","year":"2007","unstructured":"Banks, J., Pachano, M., Thompson, L., Hanny, D. (2007). RFID applied. New Jersey: Wiley."},{"key":"844_CR8","volume-title":"SecureComm 2006. Conference on security and privacy for emerging areas in communication networks","author":"M Burmester","year":"2006","unstructured":"Burmester, M., van Le, T., de Medeiros, B. (2006). Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In SecureComm 2006. Conference on security and privacy for emerging areas in communication networks. Baltimore: IEE press."},{"key":"844_CR9","doi-asserted-by":"crossref","unstructured":"Burmester, M., Van Le, T., De Medeiros, B., Tsudik, G. (2009). Universally composable RFID identification and authentication protocols. ACM Transactions on Information and Systems Security, 12(4). (Article 21).","DOI":"10.1145\/1513601.1513603"},{"key":"844_CR10","first-page":"391","volume-title":"Proceedings WISA 2007, lecture notes in computer science, Vol 6345","author":"D Carluccio","year":"2007","unstructured":"Carluccio, D., Lemke-Rust, K., Paar, C., Sadeghi, A.-R. (2007). E-Passport: The global traceability or how to feel like an UPS package. In J. K. Lee, O. Yi, M. Yung (Eds.), Proceedings WISA 2007, lecture notes in computer science (Vol. 4298, pp. 391\u2013404). Berlin: Springer."},{"key":"844_CR11","first-page":"1","volume-title":"ESORICS 2010. LNCS, Vol. 6345","author":"RH Deng","year":"2010","unstructured":"Deng, R. H., Li, Y., Yao, A. C., Yung, M., Zhao, Y. (2010). A new framework for RFID privacy. In D. Gritzalis, B. Preneel, M. Theoharidou (Eds.), ESORICS 2010. LNCS (Vol. 6345, pp. 1\u201318). Heidelberg: Springer."},{"key":"844_CR12","doi-asserted-by":"crossref","unstructured":"Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. In Proceedings of secureComm 2005 (pp. 59\u201366).","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"844_CR13","unstructured":"Duangsuwan, S., & Promwong, S. (2012). A RFID Reader suppressive interferences due to multipath. In PIERS proceedings, Kuala Lumpur, Malaysia (pp. 1472\u20131475)."},{"issue":"3","key":"844_CR14","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.comcom.2010.06.014","volume":"34","author":"DN Duc","year":"2011","unstructured":"Duc, D. N., & Kim, K. (2011). Defending RFID authentication protocols against DoS attacks, 34(3),384\u2013390.","journal-title":"Computer Communications"},{"key":"844_CR15","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Robshaw, M., Sibert, H. An active attack against HB + -A provably secure lightweight authentication protocol. Cryptology ePrint Archive, Report 2005\/23, http:\/\/eprint.iacr.org\/2005\/23.pdf.","DOI":"10.1049\/el:20052622"},{"key":"844_CR16","first-page":"267","volume-title":"ESORICS 2008. LNCS, Vol. 5283","author":"J Ha","year":"2008","unstructured":"Ha, J., Moon, S., Zhou, J., Ha, J. (2008). A new formal proof model for RFID location privacy. In S. Jajodia & J Lopez (Eds.), ESORICS 2008. LNCS (Vol. 5283, pp. 267\u2013281). Heidelberg: Springer."},{"key":"844_CR17","unstructured":"Hancke, G. P. (2008). Eavesdropping attacks on high-frequency RFID tokens. In Proceedings of the 4th Workshop on RFID Security, RFIDSec08."},{"key":"844_CR18","unstructured":"Hernndez Castro, J.C., Peris-Lopez, P., Phan, R.C.-W., Estvez-Tapiador, J.M. (2010). Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol. In S.B. Ors Yalcin (Ed.), RFIDSec 2010. LNCS (Vol. 6370, pp. 2234). Springer."},{"key":"844_CR19","unstructured":"ISO\/IEC 17799 (2005). Information technology-security tech niques-code of practice for information security management. International organization for standardization."},{"key":"844_CR20","doi-asserted-by":"crossref","unstructured":"Juels, A. (2005). Strengthening EPC tags against cloning. In The Proceedings of WiSe\u201905.","DOI":"10.1145\/1080793.1080805"},{"key":"844_CR21","unstructured":"Juels, A., & Weis, S. (2006). Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006\/137, http:\/\/eprint.iacr.org\/2006\/137 ."},{"issue":"7","key":"844_CR22","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s00779-006-0116-1","volume":"11","author":"S Konomi","year":"2007","unstructured":"Konomi, S., & Roussos, G. (2007). Ubiquitous computing in the real world: Lessons learnt from large scale RFID deployments. Personal and Ubiquitous Computing, 11(7), 507\u2013521.","journal-title":"Personal and Ubiquitous Computing"},{"key":"844_CR23","unstructured":"Li, L., & Deng, R. H. (2007). Vulnerability analysis of EMAP-An efficient RFID mutual authentication protocol. In AReS 2007: Second International Conference on Availability Reliability and Security."},{"issue":"3","key":"844_CR24","first-page":"1","volume":"3","author":"T Li","year":"2008","unstructured":"Li, T., Wang, G., Deng, R. H. (2008). Security analysis on a family of ultra-lightweight RFID authentication protocols. Journal of Software, 3(3), 1\u201310.","journal-title":"Journal of Software"},{"key":"844_CR25","first-page":"1","volume-title":"ICICS 2006. LNCS Vol. 4307","author":"CH Lim","year":"2006","unstructured":"Lim, C. H., & Kwon, T. (2006). Strong and robust RFID authentication enabling perfect ownership transfer. In P. Ning, S. Qing, N Li (Eds.), ICICS 2006. LNCS (Vol. 4307, pp. 1\u201320). Heidelberg: Springer."},{"key":"844_CR26","doi-asserted-by":"crossref","unstructured":"Ma, C., Li, Y., Deng, R., Li, T. (2009). RFID privacy: Relation between two notions, minimal condition, and efficient construction. In ACM CCS.","DOI":"10.1145\/1653662.1653670"},{"key":"844_CR27","unstructured":"Michelin Embeds RFID Tags in Tires. RFID Journal http:\/\/www.rfidjournal.com\/article\/articleview\/269\/1\/1\/ ."},{"issue":"5","key":"844_CR28","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s10796-009-9210-z","volume":"12","author":"A Mitrokotsa","year":"2010","unstructured":"Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S. (2010). Classifying RFID attacks and defenses. Information Systems Frontiers - ISF, 12(5), 491\u2013505.","journal-title":"Information Systems Frontiers - ISF"},{"key":"844_CR29","unstructured":"Mutti, C., & Wittneben, A. (2007). Robust signal detection in passive RFID systems. In First international eurasip workshop on RFID technology, Vienna."},{"key":"844_CR30","first-page":"321","volume-title":"ESORICS 2009. LNCS Vol. 5789","author":"CY Ng","year":"2009","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R. (2009). New privacy results on synchronized RFID authentication protocols against tag tracing. In M. Backes & P. Ning (Eds.), ESORICS 2009. LNCS (Vol. 5789, pp. 321\u2013336). Heidelberg: Springer."},{"key":"844_CR31","volume-title":"UbiComp 2004. LNCS Vol. 3205","author":"M Ohkubo","year":"2004","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S. (2004). Efficient hash-chain based RFID privacy protection scheme. In N. Davies, E.D. Mynatt, I. Siio (Eds.), UbiComp 2004. LNCS Vol. 3205. Heidelberg: Springer."},{"key":"844_CR32","first-page":"263","volume-title":"ISPEC 2008. LNCS Vol. 4991","author":"K Ouafi","year":"2008","unstructured":"Ouafi, K., & Phan, R.C.-W. (2008). Privacy of recent RFID authentication protocols. In L. Chen, Y. Mu, W. Susilo (Eds.), ISPEC 2008. LNCS (Vol. 4991, pp. 263\u2013277). Heidelberg: Springer."},{"key":"844_CR33","first-page":"479","volume-title":"ACNS 2008. LNCS Vol. 5037","author":"K Ouafi","year":"2008","unstructured":"Ouafi, K., & Phan, R.C.-W. (2008). Traceable privacy of recent provably-secure RFID Protocols. In S.M. Bellovin & et al. (Eds.), ACNS 2008. LNCS (Vol. 5037, pp. 479\u2013489). Heidelberg: Springer-Verlag."},{"key":"844_CR34","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernndez Castro, J.C., Estvez-Tapiador, J.M., van der Lubbe, J.C.A. (2010). Security flaws in a recent ultralightweight RFID protocol. In Workshop on RFID security (RFIDSec Asia\u201910) of cryptology and information security series (Vol. 4, pp. 83\u201393). IOS Press.","DOI":"10.1007\/978-3-642-16342-5_28"},{"issue":"9","key":"844_CR35","doi-asserted-by":"crossref","first-page":"1502","DOI":"10.1016\/j.comnet.2009.11.007","volume":"54","author":"P Peris-Lopez","year":"2010","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A. (2010). Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54(9), 1502\u20131508.","journal-title":"Computer Networks"},{"issue":"4","key":"844_CR36","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TDSC.2008.33","volume":"6","author":"RCW Phan","year":"2009","unstructured":"Phan, R.C.-W. (2009). Cryptanalysis of a new ultra lightweight RFID authentication protocol - SASI. IEEE Transactions on Dependable and Secure Computing, 6(4), 316\u2013320.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"844_CR37","doi-asserted-by":"crossref","unstructured":"Phan, R.C.-W., Wu, J., Ouafi, K., Stinson, D.R. (2010). Privacy analysis of forward and backward untraceable RFID authentication schemes. Wireless Personal Communications, 54(2), Springer. doi: 10.1007\/s11277-010-0001-0 .","DOI":"10.1007\/s11277-010-0001-0"},{"issue":"4","key":"844_CR38","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/LCOMM.2009.082117","volume":"13","author":"P Rizomiliotis","year":"2009","unstructured":"Rizomiliotis, P., Rekleitis, E., Gritzalis, S. (2009). Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags. IEEE Communications Letters, 13(4), 274\u2013276.","journal-title":"IEEE Communications Letters"},{"key":"844_CR39","unstructured":"Schuerenberg, B. K. (2005). Keeping tabs with RFID. Health Data Management, http:\/\/www.healthdatamanagement.com\/issues\/20051001\/11276-1.html ."},{"key":"844_CR40","first-page":"2008","volume-title":"RFID tag ownership transfer. In Proceedings of Workshop on RFID Security (RFIDsec)","author":"B Song","year":"2008","unstructured":"Song, B. (2008). RFID tag ownership transfer. In Proceedings of workshop on RFID security (RFIDsec 2008), Budapest., (p. 2008). Hungary: Budapest."},{"key":"844_CR41","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1145\/1352533.1352556","volume-title":"ACM conference on wireless network security WiSec08","author":"B Song","year":"2008","unstructured":"Song, B., & Mitchell, C.J. (2008). RFID authentication protocol for low-cost tags. In V.D. Gligor, J. Hubaux, R. Poovendran (Eds.), ACM conference on wireless network security WiSec08, (pp. 140\u2013147). USA: ACM Press."},{"key":"844_CR42","doi-asserted-by":"crossref","unstructured":"Song, B., & Mitchell, C.J. (2009). Scalable RFID pseudonym protocol. In Proceedings of the third international conference on network and system security NSS 2009 (pp. 216\u2013224). IEEE Computer Society.","DOI":"10.1109\/NSS.2009.15"},{"issue":"4","key":"844_CR43","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","volume":"2011","author":"B Song","year":"2011","unstructured":"Song, B., & Mitchell, C.J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 34(4), 556\u2013566.","journal-title":"Computer Communications"},{"key":"844_CR44","unstructured":"Thales e-Security: Smart cards for payment systems. www.thalesesecurity.com\/whitepapers\/documents\/smart-cards-payment-systems.pdf ."},{"key":"844_CR45","doi-asserted-by":"crossref","unstructured":"Tsudik, G. (2006). YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In Proceedings of PerCom 2006 (pp. 640\u2013643).","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"844_CR46","doi-asserted-by":"crossref","unstructured":"van Deursen, T., Mauw, S., Radomirovi\u0107, S. (2008). Untraceability of RFID protocols. In J. A. Onieva et al. (Eds.), WISTP 2008. LNCS (Vol. 5019, pp. 115). Springer.","DOI":"10.1007\/978-3-540-79966-5_1"},{"key":"844_CR47","unstructured":"van Deursen, T., & Radomirovi\u0107, S. (2009). Algebraic attacks on RFID Protocols. In Proceedings of information security theory and practices: smart devices, pervasive systems, and ubiquitous networks (WISTP\u201909). LNCS, (Vol. 5746, pp. 38\u201351). Springer."},{"key":"844_CR48","unstructured":"van Deursen, T., & Radomirovic, S. (2008). Attacks on RFID protocols. Cryptology ePrint archive, Report 2008\/310. http:\/\/eprint.iacr.org\/2008\/310 ."},{"key":"844_CR49","first-page":"68","volume-title":"ASIACRYPT 2007. LNCS Vol. 4833","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S. (2007). On privacy models for RFID. In K. Kurosawa, (Ed.), ASIACRYPT 2007. LNCS (Vol. 4833, pp. 68\u201387). Heidelberg: Springer."},{"issue":"5","key":"844_CR50","first-page":"111","volume":"8","author":"L Vojtech","year":"2010","unstructured":"Vojtech, L. (2010). RFID signal denoising - experiments with neural network. Information and Communication Technologies and Services, 8(5), 111\u2013113.","journal-title":"Information and communication technologies and services"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-013-0844-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11265-013-0844-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-013-0844-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T04:34:55Z","timestamp":1563942895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11265-013-0844-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,18]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["844"],"URL":"https:\/\/doi.org\/10.1007\/s11265-013-0844-1","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,18]]}}}