{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:07:30Z","timestamp":1760080050329,"version":"3.37.3"},"reference-count":11,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"],"award-info":[{"award-number":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"],"award-info":[{"award-number":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"],"award-info":[{"award-number":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"],"award-info":[{"award-number":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High Technology Research and Development Program of China","award":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"],"award-info":[{"award-number":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"]}]},{"DOI":"10.13039\/501100004835","name":"Zhejiang University","doi-asserted-by":"publisher","award":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"],"award-info":[{"award-number":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"]}],"id":[{"id":"10.13039\/501100004835","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National 111 Program of China","award":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"],"award-info":[{"award-number":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"]}]},{"name":"National 111 Program of China","award":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"],"award-info":[{"award-number":["61303216","61272457","U1401251","61373172","2012AA013102","ICT170312","B16037","B08038"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>As one of the core techniques in 5G, the Internet of Things (IoT) is increasingly attracting people\u2019s attention. Meanwhile, as an important part of IoT, the Near Field Communication (NFC) is widely used on mobile devices and makes it possible to take advantage of NFC system to complete mobile payment and merchandise information reading. But with the development of NFC, its problems are increasingly exposed, especially the security and privacy of authentication. Many NFC authentication protocols have been proposed for that, some of them only improve the function and performance without considering the security and privacy, and most of the protocols are heavyweight. In order to overcome these problems, this paper proposes an ultralightweight mutual authentication protocol, named ULMAP. ULMAP only uses Bit and XOR operations to complete the mutual authentication and prevent the denial of service (DoS) attack. In addition, it uses subkey and subindex number into its key update process to achieve the forward security. The most important thing is that the computation and storage overhead of ULMAP are few. Compared with some traditional schemes, our scheme is lightweight, economical, practical, and easy to protect against synchronization attack.<\/jats:p>","DOI":"10.1155\/2017\/2349149","type":"journal-article","created":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T17:00:42Z","timestamp":1493312442000},"page":"1-7","source":"Crossref","is-referenced-by-count":17,"title":["ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6870-6657","authenticated-orcid":true,"given":"Kai","family":"Fan","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China"}]},{"given":"Panfei","family":"Song","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China"}]},{"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi\u2019an, China"}]}],"member":"311","reference":[{"year":"2008","key":"1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2016.7448560"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3065"},{"key":"5","doi-asserted-by":"publisher","first-page":"3095","DOI":"10.1002\/sec.1314","volume":"9","year":"2016","journal-title":"Security and Communication Networks"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2016.2539327"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1490"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2007.03.006"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2010.2203"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.11.013"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1002\/sec.710"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2007.70226"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/2349149.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/2349149.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/2349149.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T17:01:04Z","timestamp":1493312464000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2017\/2349149\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":11,"alternative-id":["2349149","2349149"],"URL":"https:\/\/doi.org\/10.1155\/2017\/2349149","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2017]]}}}