{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T01:14:10Z","timestamp":1725066850909},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11277-013-1552-7","type":"journal-article","created":{"date-parts":[[2013,12,6]],"date-time":"2013-12-06T04:52:19Z","timestamp":1386305539000},"page":"1019-1038","source":"Crossref","is-referenced-by-count":14,"title":["Simulation-Based Traceability Analysis of RFID Authentication Protocols"],"prefix":"10.1007","volume":"77","author":[{"given":"Mahdi R.","family":"Alagheband","sequence":"first","affiliation":[]},{"given":"Mohammad R.","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"1552_CR1","unstructured":"Kulseng, L. S. (2009). Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems. Msc Thesis in Iowa State University."},{"key":"1552_CR2","doi-asserted-by":"crossref","unstructured":"Konomi, S., & Roussos, G. (2007). Ubiquitous computing in the real world: Lessons learnt from large scale RFID deployments. Personal and Ubiquitous Computing, 11(7), 507\u2013521.","DOI":"10.1007\/s00779-006-0116-1"},{"key":"1552_CR3","unstructured":"Koscher, K., Juels, A., Kohno, T., & Brajkovic, V. (2008). EPC RFID tags in security applications: Passport cards, enhanced drivers licenses, and beyond. In 16th ACM conference on computer and communications security (pp. 33\u201342)."},{"key":"1552_CR4","unstructured":"Ouafi, K., & Vaudenay, S. (2009). Pathchecker: An RFID application for tracing products in supply-chains. In RFIDsec."},{"key":"1552_CR5","unstructured":"Chai, Q. (2012). Design and analysis of security schemes for low-cost RFID systems. PhD thesis presented to the University of Waterloo."},{"key":"1552_CR6","doi-asserted-by":"crossref","unstructured":"Tsudik, G. (2006). YA-TRAP: Yet another trivial RFID authentication protocol. In 4th annual IEEE international conference on pervasive computing and communications workshops (pp. 640\u2013643).","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"1552_CR7","doi-asserted-by":"crossref","unstructured":"Juels, A. (2005). Strengthening EPC tags against cloning. In Workshop on wireless security (WiSec) (pp. 67\u201376).","DOI":"10.1145\/1080793.1080805"},{"key":"1552_CR8","unstructured":"Li, T., & Deng, R. (2008). Scalable RFID authentication and discovery in EPCglobal network. In Communications and networking in China (ChinaCom) (pp. 1138\u20131142)."},{"key":"1552_CR9","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.comcom.2010.06.014","volume":"34","author":"DN Duc","year":"2011","unstructured":"Duc, D. N., & Kim, K. (2011). Defending RFID authentication protocols against DoS attacks. Journal of Computer Communications, 34, 384\u2013390.","journal-title":"Journal of Computer Communications"},{"key":"1552_CR10","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.comcom.2010.02.029","volume":"34","author":"J-S Cho","year":"2011","unstructured":"Cho, J.-S., Yeo, S.-S., & Kim, S. K. (2011). Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. Journal of Computer Communications, 34, 391\u2013397.","journal-title":"Journal of Computer Communications"},{"key":"1552_CR11","unstructured":"EPCglobal. (2008). EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz 960 MHz, Ver. 1.2.0. Specification for RFID Air Interface EPCglobal 2008."},{"key":"1552_CR12","unstructured":"EPCglobal. (2007). Low level reader protocol (LLRP), Ver. 1.0.1. Ratified Standard, EPCglobal 2007."},{"key":"1552_CR13","doi-asserted-by":"crossref","unstructured":"Coisel, I., & Martin, T. (2013). Untangling RFID privacy models. Journal of Computer Networks and Communications, 2013, 26. doi: 10.1155\/2013\/710275 .","DOI":"10.1155\/2013\/710275"},{"key":"1552_CR14","unstructured":"Avoine, G. (2005). Adversarial model for radio frequency identification. Cryptology ePrint archive, report 2005\/049. http:\/\/eprint.iacr.org\/2005\/049 ."},{"key":"1552_CR15","unstructured":"Avoine, G. (2005). Cryptography in radio frequency identification and fair ex-change protocols. Phd Thesis no. 3407, EPFL. http:\/\/library.epfl.ch\/theses\/?nr=3407 ."},{"key":"1552_CR16","unstructured":"Avoine, G., Dysli, E., & Oechslin, P. (2006). Reducing time complexity in RFID systems. In B. Preneel & S. Tavares (Eds.), SAC 2005. LNCS (Vol. 3897, pp. 291\u2013306). Heidelberg: Springer."},{"key":"1552_CR17","doi-asserted-by":"crossref","unstructured":"Lim, C.H., & Kwon, T. (2006). Strong and robust RFID authentication enabling perfect ownership transfer. In Eighth international conference on information and communications security (ICICS) (pp. 1\u201320).","DOI":"10.1007\/11935308_1"},{"key":"1552_CR18","unstructured":"Juels, A., & Weis, S. (2006). Defining strong privacy for RFID. Cryptology ePrint archive, report 2006\/137."},{"key":"1552_CR19","unstructured":"Ouafi, K., & Phan, R. C.-W. (2008). Privacy of recent RFID authentication protocols. In L. Chen, Y. Mu, & W. Susilo (Eds.), ISPEC 2008. LNCS (Vol. 4991, pp. 263\u2013277). Heidelberg: Springer."},{"key":"1552_CR20","unstructured":"Ouafi, K., & Phan, R. C.-W. (2008). Traceable privacy of recent provably-secure RFID Protocols. In S. M. Bellovin, et al. (Eds.), ACNS 2008. LNCS (Vol. 5037, pp. 479\u2013489). Berlin, Heidelberg: Springer."},{"key":"1552_CR21","doi-asserted-by":"crossref","unstructured":"Deng, R. H., Li, Y., Yung, M., & Zhao, Y. (2010). A new framework for RFID privacy. In 15th European symposium on research in computer security (ESORICS) (pp. 1\u201318).","DOI":"10.1007\/978-3-642-15497-3_1"},{"key":"1552_CR22","unstructured":"Moriyama, D., Matsuo, S., & Ohkubo, M. (2012). Relation among the security models for RFID authentication protocol. In 17th European symposium on research in computer security (ESORICS) (pp. 661\u2013678)."},{"key":"1552_CR23","unstructured":"Vaudenay, S. (2007). On privacy models for RFID. In K. Kurosawa (Ed.), ASIACRYPT 2007. LNCS (Vol. 4833, pp. 68\u201387). Heidelberg: Springer."},{"key":"1552_CR24","doi-asserted-by":"crossref","unstructured":"Paise, R.-I., & Vaudenay, S. (2008). Mutual authentication in RFID: Security and privacy. In The 3rd ACM symposium on information, computer and communications security (ASIACCS) (pp. 292\u2013299).","DOI":"10.1145\/1368310.1368352"},{"key":"1552_CR25","doi-asserted-by":"crossref","unstructured":"Fernando, H., & Abawajy, J. (2011). Mutual authentication protocol for networked RFID systems. In IEEE TrustComm.","DOI":"10.1109\/TrustCom.2011.54"},{"key":"1552_CR26","doi-asserted-by":"crossref","unstructured":"Zhu, H., Zhao, Y., Ding, S., & Jin, B. (2011). An improved forward-secure anonymous RFID authentication protocol. In Wireless communications, networking and mobile computing (WiCOM) (pp. 1\u20135).","DOI":"10.1109\/wicom.2011.6040152"},{"key":"1552_CR27","doi-asserted-by":"crossref","unstructured":"Fan, X., Gong, G., Engels, D. W. & Smith, E. M. (2011). A lightweight privacy-preserving mutual authentication protocol for RFID systems. In IEEE GLOBECOM workshops (GC Wkshps) (pp. 1083\u20131087).","DOI":"10.1109\/GLOCOMW.2011.6162345"},{"key":"1552_CR28","doi-asserted-by":"crossref","unstructured":"Hermans, J., Pashalidis, A., Vercauteren, F. & Preneel, B. (2011). A new RFID privacy model. In V. Atluri, C. Diaz (Eds.), ESORICS 2011. LNCS (Vol. 6879, pp. 568\u2013587).","DOI":"10.1007\/978-3-642-23822-2_31"},{"key":"1552_CR29","unstructured":"Ng, C. Y., Susilo, W., Mu, Y., & Safavi-Naini, R. (2010). Practical RFID ownership transfer scheme. In Workshop on RFID security (RFIDSec Asia) volume 4 of cryptology and information security. IOS press."},{"key":"1552_CR30","unstructured":"Ng, C. Y., Susilo, W., Mu, Y., & Safavi-Naini, R. (2009). New privacy results on synchronized RFID authentication protocols against tag tracing. In M. Backes & P. Ning (Eds.), ESORICS 2009. LNCS (Vol. 5789, pp. 321\u2013336). Heidelberg: Springer."},{"key":"1552_CR31","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Sadeghi, A., Scafuro, A., Visconti, I. & Wachsmann, C. (2010). On RFID privacy with mutual authentication and tag corruption. In Applied cryptography and network security (ACNS) 2010, LNCS (Vol. 6123, pp. 493\u2013510).","DOI":"10.1007\/978-3-642-13708-2_29"},{"key":"1552_CR32","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Sadeghi, A., Scafuro, A., Visconti, I., & Wachsmann, C. (2010). Impossibility results for RFID Privacy notions. In Transactions on computational science XI, LNCS, (Vol. 6480, pp. 39\u201363).","DOI":"10.1007\/978-3-642-17697-5_3"},{"key":"1552_CR33","unstructured":"Habibi, M. H., & Aref, M. R. (2011) Two RFID privacy models in front of a court. Eprint IACR archive. http:\/\/eprint.iacr.org\/2011\/625 ."},{"key":"1552_CR34","doi-asserted-by":"crossref","unstructured":"Canard, S., Coisel, I., & Girauld, M. (2010). Security of privacy-preserving RFID systems. In IEEE International conference on RFID-technology and applications (RFID-TA) (pp. 269\u2013274).","DOI":"10.1109\/RFID-TA.2010.5529920"},{"key":"1552_CR35","doi-asserted-by":"crossref","unstructured":"Avoine, G., Coisel, I., & Martin, T. (2010). Time measurement threatens privacy-friendly RFID authentication protocols. In RFIDSec. Sprinfer LNCS (Vol. 6370, pp. 138\u2013157).","DOI":"10.1007\/978-3-642-16822-2_13"},{"key":"1552_CR36","doi-asserted-by":"crossref","unstructured":"Lim, C. H., & Kwon, T. (2006). Strong and robust RFID authentication enabling perfect ownership transfer. In 8th international conference of information and communications security (ICICS) Springer-LNCS","DOI":"10.1007\/11935308_1"},{"key":"1552_CR37","doi-asserted-by":"crossref","unstructured":"Akg\u00fcn, M., & \u00c7a\u011flayan, M. (2011). Extending an RFID security and privacy model by considering forward untraceability. Security and trust management LNCS, (Vol. 6710, pp. 239\u2013254).","DOI":"10.1007\/978-3-642-22444-7_16"},{"key":"1552_CR38","doi-asserted-by":"crossref","unstructured":"He, L., Jin, S., Zhang, T., & Li, N. (2009). An enhanced 2-pass optimistic anonymous RFID authentication protocol with forward security. In WiCOM (pp. 1\u20134).","DOI":"10.1109\/WICOM.2009.5303448"},{"key":"1552_CR39","unstructured":"Engels, D., Saarinen, M.-J. O., & Smith, E. M. (2011). The Hummingbird-2 lightweight authenticated encryption algorithm. In RFIDSec 2011."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1552-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-013-1552-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1552-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T14:27:53Z","timestamp":1564928873000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-013-1552-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["1552"],"URL":"https:\/\/doi.org\/10.1007\/s11277-013-1552-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,7]]}}}