[1] XIE S,LIANG W,XU J,et al. A novel bidirectional RFID identity authentication protocol[C]//Proceedings of the 2018 IEEE SmartWorld/Ubiquitous Intelligence and Computing, Advanced and Trusted Computing/Scalable Computing and Communications/Cloud and Big Data Computing/Internet of People and Smart City Innovation. Piscataway:IEEE,2018:301-307. [2] LIANG W,TANG M,LONG J,et al. A secure FaBric blockchainbased data transmission technique for industrial internet-of-things[J]. IEEE Transactions on Industrial Informatics,2019,15(6):3582-3592. [3] QIU M,MING Z,LI J,et al. Three-phase time-aware energy minimization with DVFS and unrolling for chip multiprocessors[J]. Journal of Systems Architecture,2012,58(10):439-445. [4] CUI P Y. An improved ownership transfer and mutual authentication for lightweight RFID protocols[J]. International Journal of Network Security,2016,18(6):1173-1179. [5] LIANG W,LONG J,WENG T H,et al. TBRS:a trust-based recommendation scheme for vehicular CPS network[J]. Future Generation Computer Systems,2019,92:383-398. [6] 黄可可, 刘亚丽, 殷新春. 基于位重排变换的超轻量级RFID双向认证协议[J]. 计算机应用, 2019, 39(1):118-125.(HUANG K K, LIU Y L,YIN X C. Ultra-lightweight RFID mutual authentication protocol based on regeneration transformation[J]. Journal of Computer Applications,2019,39(1):118-125.) [7] GOPE P, LEE J, QUEK T Q S. Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions[J]. IEEE Transactions on Information Forensics and Security,2018,13(11):2831-2843. [8] HEIN D,WOLKERSTORFER J,FELBER N. ECC is ready for RFID-a proof in silicon[C]//Proceedings of the 2008 International Workshop on Selected Areas in Cryptography,LNCS 5381. Berlin:Springer,2009:401-413. [9] AVOINE G,BINGÖL M A,CARPENT X,et al. Privacy-friendly authentication in RFID systems:on sublinear protocols based on symmetric-key cryptography[J]. IEEE Transactions on Mobile Computing,2013,12(10):2037-2049. [10] NG C Y,SUSILO W,MU Y,et al. New privacy results on synchronized RFID authentication protocols against tag tracing[C]//Proceedings of the 2009 European Symposium on Computer Security,LNCS 5789. Berlin:Springer,2009:321-336. [11] LEE C I,CHIEN H Y. An elliptic curve cryptography-based RFID authentication securing E-health system[J]. International Journal of Distributed Sensor Networks, 2015, 2015:Article No. 642425. [12] KARTHIKEYAN S,NESTERENKO M. RFID security without extensive cryptography[C]//Proceedings of the 2005 3rd ACM Workshop on Security of ad hoc and Sensor Networks. New York:ACM,2005:63-67. [13] LIAO Y P, HSIAO C M. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol[J]. Ad Hoc Networks,2014,18:133-146. [14] CHIEN H Y. De-synchronization attack on quadratic residuesbased RFID ownership transfer[C]//Proceedings of the 2015 10th Asia Joint Conference on Information Security. Piscataway:IEEE, 2015:42-47. [15] LIANG W,XIE S,LONG J,et al. A double PUF-based RFID identity authentication protocol in service-centric Internet of things environments[J]. Information Sciences,2019,503:129-147. [16] PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZ TAPIADOR J M, et al. LMAP:a real lightweight mutual authentication protocol for low-cost RFID tags[EB/OL].[2020-09-12]. http://rfidsec2013.iaik.tugraz.at/RFIDSec06/Program/papers/013%20-%20Lightweight%20Mutual%20Authentication.pdf. [17] PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZTAPIADOR J M,et al. EMAP:an efficient mutual-authentication protocol for low-cost RFID tags[C]//Proceedings of the 2006 OTM Confederated International Conferences on the Move to Meaningful Internet Systems, LNCS 4277. Berlin:Springer, 2006:352-361. [18] PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZTAPIADOR J M,et al. M2AP:a minimalist mutual-authentication protocol for low-cost RFID tags[C]//Proceedings of the 2006 International Conference on Ubiquitous Intelligence and Computing,LNCS 4159. Berlin:Springer,2006:912-923. [19] CHIEN H Y,HUANG C W. Security of ultra-lightweight RFID authentication protocols and its improvements[J]. ACM SIGOPS Operating Systems Review,2007,41(4):83-86. [20] LI T,WANG G. Security analysis of two ultra-lightweight RFID authentication protocols[C]//Proceedings of the 2007 IFIP International Information Security Conference, IFIPAICT 232. Boston:Springer,2007:109-120. [21] PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,TAPIADOR J M E,et al. Advances in ultralightweight cryptography for low-cost RFID tags:Gossamer protocol[C]//Proceedings of the 2008 International Workshop on Information Security Applications, LNCS 5379. Berlin:Springer,2009:56-68. [22] TIAN Y, CHEN G, LI J. A new ultralightweight RFID authentication protocol with permutation[J]. IEEE Communications Letters,2012,16(5):702-705. [23] TAQIEDDIN E,SARANGAPANI J. Vulnerability analysis of two ultra-lightweight RFID authentication protocols:RAPP and gossamer[C]//Proceedings of the 2012 International Conference for Internet Technology and Secured Transactions. Piscataway:IEEE,2012:80-86. [24] EPCglobal Inc. Specification for RFID air interface. EPCTM radiofrequency identity protocols. class-1 generation-2 UHF RFID. protocol for communications at 860 MHz-960 MHz version1.2. 0[S/OL].[2020-05-26]. https://www.gs1.org/sites/default/files/docs/epc/uhfc1g2_1_2_0-standard-20080511.pdf. [25] GAO X,LV S,ZHANG H,et al. A kind of RFID security protocol based on the algorithm of present[C]//Proceedings of the 2018 5th International Conference on Systems and Informatics. Piscataway:IEEE,2018:50-55. [26] CHEN M, CHEN S, FANG Y. Lightweight anonymous authentication protocols for RFID systems[J]. IEEE/ACM Transactions on Networking,2017,25(3):1475-1488. [27] PARK H,ROH H,LEE W. Tagora:a collision-exploitative RFID authentication protocol based on cross-layer approach[J]. IEEE Internet of Things Journal,2020,7(4):3571-3585. [28] SALEM F M,AMIN R. A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS[J]. Information Sciences,2020,527:382-393. [29] WANG G,CAI H,QIAN C,et al. Hu-Fu:replay-resilient RFID authentication[J]. IEEE/ACM Transactions on Networking, 2020,28(2):547-560. [30] FAN K,LUO Q,ZHANG K,et al. Cloud-based lightweight secure RFID mutual authentication protocol in IoT[J]. Information Sciences,2020,527:329-340. [31] DOLEV D,YAO A. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2):198-208. [32] CAI Q,ZHAN Y,WANG Y. A minimalist mutual authentication protocol for RFID system & BAN logic analysis[C]//Proceedings of the 2008 ISECS International Colloquium on Computing, Communication,Control,and Management. Piscataway:IEEE, 2008:449-453. [33] VIGANÒ L. Automated security protocol analysis with the AVISPA tool[J]. Electronic Notes in Theoretical Computer Science,2006,155:61-86. [34] ARMANDO A,BASIN D,BOICHUT Y,et al. The AVISPA tool for the automated validation of internet security protocols and applications[C]//Proceedings of 2005 International Conference on Computer Aided Verification,LNCS 3576. Berlin:Springer, 2005:281-285. |