张学军,蔡文琦,王锁萍.改进型自适应多叉树防碰撞算法研究[J].电子学报,2012,40(1):193-198. Zhang Xue-jun,Cai Wen-qi,Wang Suo-ping.One Anti-collision algorithm based on improved adaptive multi-tree search[J].Acta Electronica Sinica,2012,40(1):193-198.(in Chinese)
[2]
宁焕生,徐群玉.全球物联网发展及中国物联网建设若干思考[J].电子学报,2010,38(11):2590-2599. Ning Huan-sheng,Xu Qun-yu.Research on global internet of things developments and its construction in China[J].Acta Electronica Sinica,2010,38(11):2590-2599.(in Chinese)
[3]
Gong Li,Needham R,Yahalom R.Reasoning about belief in cryptographic protocols .Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy .IEEE Computer Society Press,Los Alamitos,CA.1990:234-248.
[4]
Sarma S E,Weis S A,Engels D W.RFID systems and security and privacy implications .In B.Kaliski,editor,CHES''02,volume 2523 of Lectures Notes in Computer Science .Berlin:Springer-Verlag,2003.454-469.
[5]
S A Weis.Security and privacy in radio-frequency identification devices .Master''s thesis,MIT,Cambridge,MA 02139,May 2003.
[6]
Miyako Ohkubo,Koutarou Suzuki,Shingo Kinoshita.Hash-chain based forward-secure privacy protection scheme for low-cost RFID .Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004) .Sendai,Japan,2004.719-724.
[7]
Pedro Peris-Lopez,Julio Cesar Hernandez-Castro,Juan Estevez-Tapiador,et al.M2AP:A minimalist mutual authentication protocol for low-cost RFID tags .International Conference on Ubiquitous Intelligence and Computing-UIC''06,volume 4159 of Lecture Notes in Computer Science .Berlin:Springer-Verlag,September 2006.912-923.
[8]
Jian Shen,Dongmin Choi,Sangman Moh,et al.A novel anonymous RFID authentication protocol providing strong privacy and security .2010 International Conference on Multimedia Information Networking and Security .Nanjing,China,2010.584-588.
[9]
Myneni S,Misra S,Guoliang Xue.SAMA:Serverless Anonymous mutual authentication for low-cost RFID tags .2011 IEEE International Conference on Communications .Kyoto,Japan,June 2011.1-5.
[10]
Mubarak M F,Manan J A,Yahya S.A critical review on RFID system towards security,trust,and privacy (STP) .IEEE 7th International Colloquium on Signal Processing and its Applications .Penang,Malaysia,Mar.2011.39-44.
[11]
Hoopad Mobahat.Authentication and lightweight cryptography in low cost RFID .2nd International Conference on Software Technology and Engineering .San Juan,PR,Oct.2010(V2):123-129.
[12]
Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LMAP:A real lightweight mutual authentication protocol for low-cost RFID tags .Proc.Second Workshop on RFID Security .Graz,Austria,July 2006.
[13]
H Y Chien.SASI:A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J].IEEE Trans.Dependable and Secure Computing,2007,4(4):337-340.
[14]
Paolo D''Arco,Alfredo De Santis.On ultralightweight RFID authentication protocols [J].IEEE Transactions on Dependable and Secure Computing,2011,8(4):548-563.
[15]
Hung-Min Sun,Wei-Chih Ting,King-Hang Wang.On the security of Chien''s ultralightweight RFID authentication protocol[J].IEEE Transactions on Dependable and Secure Computing,2011,8(2):315-317.
[16]
Tieyan Li,Robert Deng.Vulnerability Analysis of EMAP-An efficient RFID mutual authentication protocol .In IFIP SEC 2007 .sandton,Gauteng,South Africa,May 2007.
[17]
Li T,Deng R H,Wang G.The security and improvement of an ultra-lightweight RFID authentication protocols[J].Security and communication networks,2008,1(2):135-146.
[18]
唐静,姬东耀.基于LPN问题的RFID安全协议设计与分析[J].电子与信息学报,2009,31(2):439-443. Tang Jing,Ji Dong-yao.Design and analysis of security protocols for RFID based on LPN problem[J].Journal of Electronics &Information Technology,2009,31(2):439-443.(in Chinese)