{"id":"https://openalex.org/W2013304695","doi":"https://doi.org/10.1109/fskd.2012.6234312","title":"An efficient authentication protocol for low-cost RFID system in the prensence of malicious readers","display_name":"An efficient authentication protocol for low-cost RFID system in the prensence of malicious readers","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W2013304695","doi":"https://doi.org/10.1109/fskd.2012.6234312","mag":"2013304695"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2012.6234312","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2012.6234312","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040512393","display_name":"Shuang Mei","orcid":null},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuang Mei","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, 400065, China","College of Computer Science and Technology, Chongqing University of Posts and telecommunications, 400065, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, 400065, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and telecommunications, 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070430221","display_name":"Xiaolong Yang","orcid":"https://orcid.org/0000-0001-5102-6962"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao-long Yang","raw_affiliation_strings":["School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China","[School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China]"],"affiliations":[{"raw_affiliation_string":"School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"[School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China]","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040512393"],"corresponding_institution_ids":["https://openalex.org/I10535382"],"apc_list":null,"apc_paid":null,"fwci":1.5302,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.84362934,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"2111","last_page":"2114"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8184055089950562},{"id":"https://openalex.org/keywords/radio-frequency-identification","display_name":"Radio-frequency identification","score":0.671650767326355},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6710435748100281},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6617422699928284},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6417955756187439},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5628423094749451},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5613230466842651},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5344134569168091},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.516920804977417},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.4889925718307495},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4530104100704193},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.42569872736930847},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34355291724205017},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29436177015304565}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8184055089950562},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.671650767326355},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6710435748100281},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6617422699928284},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6417955756187439},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5628423094749451},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5613230466842651},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5344134569168091},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.516920804977417},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.4889925718307495},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4530104100704193},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.42569872736930847},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34355291724205017},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29436177015304565},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2012.6234312","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2012.6234312","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W187259865","https://openalex.org/W1862712733","https://openalex.org/W1966708729","https://openalex.org/W1970283599","https://openalex.org/W1989293810","https://openalex.org/W2079546775","https://openalex.org/W2112137829","https://openalex.org/W2151783055"],"related_works":["https://openalex.org/W2355452447","https://openalex.org/W1536503377","https://openalex.org/W2017959161","https://openalex.org/W2466913372","https://openalex.org/W2406792259","https://openalex.org/W2362358462","https://openalex.org/W2355344682","https://openalex.org/W2785513402","https://openalex.org/W1968284308","https://openalex.org/W1493058717"],"abstract_inverted_index":{"In":[0],"RFID":[1,50,61],"(radio":[2],"frequency":[3],"identification)":[4],"system":[5,62],"which":[6],"uses":[7],"mobile":[8],"readers,":[9,87],"the":[10,64,107,116,120],"communication":[11],"link":[12],"between":[13,123],"backend":[14,33,124],"server":[15,34,125],"and":[16,21,35,44,74,97,103,126],"reader":[17,46],"is":[18],"not":[19,114],"secure":[20,43],"stable.":[22],"So":[23],"Malicious":[24],"readers":[25,68,112],"have":[26],"opportunities":[27],"to":[28,41],"enter":[29],"system,":[30],"then":[31],"attack":[32],"tag":[36,94],"simultaneously.":[37],"Therefore,":[38],"it's":[39],"necessary":[40],"implement":[42],"effective":[45],"identification":[47],"mechanism":[48],"in":[49,63],"system.":[51],"This":[52],"paper":[53],"proposes":[54],"an":[55],"efficient":[56],"authentication":[57,122],"protocol":[58],"for":[59],"low-cost":[60],"presence":[65],"of":[66,109,119],"malicious":[67,86,111],"(denoted":[69],"as":[70,89],"EAPMR).":[71],"The":[72],"security":[73],"efficiency":[75],"analysis":[76],"result":[77],"shows,":[78],"EAPMR":[79],"can":[80,113],"resist":[81],"many":[82],"attacks":[83],"initiated":[84],"by":[85],"such":[88],"message":[90,92],"interception,":[91],"modification,":[93],"tracking,":[95],"replay":[96],"desynchronization,":[98],"etc.,":[99],"with":[100],"low":[101],"computing":[102],"processing":[104],"cost.":[105],"Under":[106],"protection":[108],"EAPMR,":[110],"threaten":[115],"normal":[117],"operation":[118],"two-way":[121],"tag.":[127]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
