{"id":"https://openalex.org/W2765267001","doi":"https://doi.org/10.1109/tifs.2017.2768022","title":"Every Step You Take, I\u2019ll Be Watching You: Practical StepAuth-Entication of RFID Paths","display_name":"Every Step You Take, I\u2019ll Be Watching You: Practical StepAuth-Entication of RFID Paths","publication_year":2017,"publication_date":"2017-10-30","ids":{"openalex":"https://openalex.org/W2765267001","doi":"https://doi.org/10.1109/tifs.2017.2768022","mag":"2765267001"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2768022","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2768022","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ink.library.smu.edu.sg/sis_research/3997","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045274451","display_name":"Kai Bu","orcid":"https://orcid.org/0000-0003-1188-801X"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kai Bu","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111386964","display_name":"Yingjiu Li","orcid":null},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yingjiu Li","raw_affiliation_strings":["School of Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045274451"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":1.1705,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.83637696,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"13","issue":"4","first_page":"834","last_page":"849"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8384943008422852},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.7095605134963989},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6249924898147583},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5829956531524658},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5457914471626282},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5217774510383606},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5184311866760254},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.4808376729488373},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.4379500448703766},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.43347200751304626},{"id":"https://openalex.org/keywords/issuer","display_name":"Issuer","score":0.412382036447525},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07561895251274109},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07481452822685242}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8384943008422852},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.7095605134963989},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6249924898147583},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5829956531524658},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5457914471626282},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5217774510383606},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5184311866760254},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.4808376729488373},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.4379500448703766},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.43347200751304626},{"id":"https://openalex.org/C138170105","wikidata":"https://www.wikidata.org/wiki/Q1337949","display_name":"Issuer","level":2,"score":0.412382036447525},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07561895251274109},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07481452822685242},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tifs.2017.2768022","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2768022","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-4999","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/3997","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TIFS.2017.2768022","raw_type":"Journal Article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-4861","is_oa":false,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/3859","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TIFS.2017.2768022","raw_type":"Journal Article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-4906","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/3904","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TIFS.2017.2768022","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-4999","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/3997","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TIFS.2017.2768022","raw_type":"Journal Article"},"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G6076312347","display_name":null,"funder_award_id":"61402404","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W76617879","https://openalex.org/W1503712059","https://openalex.org/W1565745194","https://openalex.org/W1607198972","https://openalex.org/W1880212920","https://openalex.org/W1887350446","https://openalex.org/W1933366382","https://openalex.org/W1978049866","https://openalex.org/W1981621285","https://openalex.org/W1988486393","https://openalex.org/W2013613544","https://openalex.org/W2039561385","https://openalex.org/W2042923641","https://openalex.org/W2050186016","https://openalex.org/W2052082370","https://openalex.org/W2114225697","https://openalex.org/W2123845384","https://openalex.org/W2142662651","https://openalex.org/W2149393733","https://openalex.org/W2152436975","https://openalex.org/W2157679418","https://openalex.org/W2161819091","https://openalex.org/W2547137208","https://openalex.org/W2602129873","https://openalex.org/W2951728993","https://openalex.org/W3140968660","https://openalex.org/W6629915824","https://openalex.org/W6640509254","https://openalex.org/W6764339329"],"related_works":["https://openalex.org/W2468279273","https://openalex.org/W2354198838","https://openalex.org/W1989130879","https://openalex.org/W3123948588","https://openalex.org/W2103419012","https://openalex.org/W4206711434","https://openalex.org/W2917965976","https://openalex.org/W2988126442","https://openalex.org/W4213293283","https://openalex.org/W4238669341"],"abstract_inverted_index":{"Path":[0],"authentication":[1,52,89],"thwarts":[2],"counterfeits":[3],"in":[4,33,127,132],"RFID-based":[5],"supply":[6,26],"chains.":[7],"Its":[8],"motivation":[9],"is":[10,92],"that":[11,34,91],"tagged":[12],"products":[13,97],"taking":[14,183],"invalid":[15],"paths":[16,59],"are":[17,31],"likely":[18],"faked":[19],"and":[20,74,144,188,231],"injected":[21],"by":[22,53,182,216],"adversaries":[23],"at":[24],"certain":[25],"chain":[27],"partners/steps.":[28],"Existing":[29],"solutions":[30],"path-grained":[32],"they":[35,49],"simply":[36],"regard":[37],"a":[38,66,104,107,120,193,197,206],"product":[39,121],"as":[40,131],"genuine":[41],"if":[42],"it":[43],"takes":[44],"any":[45],"valid":[46,58,175],"path.":[47],"Furthermore,":[48],"enforce":[50],"distributed":[51],"offloading":[54],"the":[55,85,118,128,133],"sets":[56],"of":[57,169,185,201],"to":[60,123,136,148,229,235],"some":[61],"or":[62],"all":[63,171],"steps":[64,126,172],"from":[65,173],"centralized":[67],"issuer.":[68],"This":[69],"not":[70],"only":[71],"imposes":[72],"network":[73],"storage":[75],"overhead":[76],"but":[77],"also":[78],"leaks":[79],"transaction":[80],"privacy.":[81],"We":[82,102,177],"present":[83],"StepAuth,":[84],"first":[86],"step-grained":[87],"path":[88,100,105,111,135,151,200],"protocol":[90],"practically":[93,180,198],"efficient":[94,181],"for":[95,196],"authenticating":[96],"with":[98,109],"strict":[99],"bindings.":[101],"encode":[103,230],"into":[106],"secret":[108,207],"minimum":[110],"visibility":[112],"disclosure":[113],"between":[114],"adjacent":[115],"steps.":[116],"Carrying":[117],"secret,":[119],"has":[122],"go":[124],"through":[125],"exact":[129],"order":[130],"designated":[134],"pass":[137],"authentication.":[138],"StepAuth":[139,163,179,204,224],"enforces":[140],"no":[141],"tag":[142],"computation":[143],"enables":[145],"each":[146],"step":[147],"locally":[149],"verify":[150],"secrets":[152,222],"without":[153],"pre-offloaded":[154],"valid-path":[155],"sets.":[156],"Toward":[157],"an":[158,166],"even":[159],"higher":[160],"security":[161,195],"guarantee,":[162],"can":[164,212],"hinder":[165],"adversary":[167],"capable":[168],"compromising":[170],"forging":[174],"secrets.":[176],"make":[178],"advantage":[184],"nested":[186],"encryption":[187],"hybrid":[189],"encryption.":[190],"To":[191],"achieve":[192],"128-b":[194],"long":[199],"100":[202],"steps,":[203],"generates":[205],"around":[208,232],"10":[209,233],"KB,":[210],"which":[211],"be":[213],"well":[214],"supported":[215],"high-memory":[217],"EPC":[218],"Gen2":[219],"tags.":[220],"Such":[221],"take":[223],"less":[225],"than":[226],"1":[227],"s":[228],"ms":[234],"verify.":[236]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":4}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
