{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:31Z","timestamp":1740141811369,"version":"3.37.3"},"reference-count":31,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303221","61373175","K5051303021","13D211205"],"award-info":[{"award-number":["61303221","61373175","K5051303021","13D211205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303221","61373175","K5051303021","13D211205"],"award-info":[{"award-number":["61303221","61373175","K5051303021","13D211205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"crossref","award":["61303221","61373175","K5051303021","13D211205"],"award-info":[{"award-number":["61303221","61373175","K5051303021","13D211205"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100006249","name":"Donghua University","doi-asserted-by":"crossref","award":["61303221","61373175","K5051303021","13D211205"],"award-info":[{"award-number":["61303221","61373175","K5051303021","13D211205"]}],"id":[{"id":"10.13039\/501100006249","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,11,1]]},"abstract":"<jats:p> The prevalence of Radio Frequency Identification (RFID) technology requires Privacy-Preserving Authentication (PPA) protocols to prevent privacy leakage during authentication. Existing PPA protocols employ the per-tag authentication, in which the reader has to sequentially authenticate the tags within the detecting region. Such a processing pattern becomes a bottleneck in current RFID enabled systems, especially for those batch-type processing applications. In this paper, we propose an efficient authentication protocol, which leverages the collaboration among multiple tags for accelerating the authentication speed. We also find that the collision, usually being considered as a negative factor, is helpful media to enable collaborative authentication among tags. Our protocol, termed as Multiple-tags privacy-preserving Authentication Protocol (MAP), authenticates a batch of tags concurrently with strong privacy and high efficiency. The analytical and simulation results show that the efficiency of MAP is better than O([Formula: see text]) and asymptotically approaches O(1). <\/jats:p>","DOI":"10.1155\/2013\/109439","type":"journal-article","created":{"date-parts":[[2013,11,6]],"date-time":"2013-11-06T21:06:02Z","timestamp":1383771962000},"page":"109439","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["MAP: Towards Authentication for Multiple Tags"],"prefix":"10.1177","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0895-797X","authenticated-orcid":false,"given":"Qingsong","family":"Yao","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi'an, China"},{"name":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China"},{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5064-1955","authenticated-orcid":false,"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Saiyu","family":"Qi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong"}]},{"given":"Zhuo","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong"}]},{"given":"Shan","family":"Chang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, Shanghai, China"}]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi'an, China"}]}],"member":"179","published-online":{"date-parts":[[2013,11,6]]},"reference":[{"key":"B1-2013-109439","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.11.004"},{"key":"B2-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.23"},{"key":"B3-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.77"},{"key":"B5-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"B6-2013-109439","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_4"},{"key":"B7-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.80"},{"key":"B8-2013-109439","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71039-4_9"},{"volume-title":"Proceedings of the Workshop on RFID Security (RFIDSec '09)","author":"Halevi T.","key":"B9-2013-109439"},{"key":"B10-2013-109439","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368351"},{"key":"B11-2013-109439","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39881-3_18"},{"volume-title":"Proceedings of the ACM Ubicomp Workshops","author":"Ohkubo M.","key":"B12-2013-109439"},{"key":"B13-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.67"},{"key":"B14-2013-109439","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_20"},{"key":"B15-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276922"},{"first-page":"149","volume-title":"Proceedings of the 4th International Conference on Security in Communication Networks (SCN '04)","author":"Juels A.","key":"B16-2013-109439"},{"key":"B17-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4454918"},{"key":"B18-2013-109439","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653670"},{"key":"B19-2013-109439","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_19"},{"key":"B20-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.5"},{"key":"B21-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.13"},{"key":"B22-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912773"},{"key":"B23-2013-109439","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609963"},{"key":"B24-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462153"},{"key":"B25-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762764"},{"key":"B26-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.041411.110283"},{"key":"B27-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089075"},{"key":"B28-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459844"},{"first-page":"202","volume-title":"Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '06)","author":"Myung J.","key":"B29-2013-109439"},{"key":"B32-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375837"},{"key":"B34-2013-109439","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_5"},{"key":"B35-2013-109439","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2011.52"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/109439","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/109439","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/109439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T21:21:36Z","timestamp":1621200096000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/109439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,1]]},"references-count":31,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2013,11,1]]}},"alternative-id":["10.1155\/2013\/109439"],"URL":"https:\/\/doi.org\/10.1155\/2013\/109439","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,11,1]]}}}