Page 17 - Read Online
P. 17

Page 118                                             Calderoni et al. J Surveill Secur Saf 2020;1:106-18  I  http://dx.doi.org/10.20517/jsss.2019.01

               REFERENCES
               1.  Conti M, Dehghantanha A, Franke K, Watson S. Internet of things security and forensics: challenges and opportunities. Future Generation
                   Comp Syst 2018;78:544-6.
               2.  Palmieri P, Calderoni L, Maio D. Private inter-network routing for wireless sensor networks and the internet of things. Proceedings of the
                   Computing Frontiers Conference (CF’17). ACM, New York, USA; 2017;396-401.
               3.  Mehta R, Sahni J, Khanna K. Internet of things: vision, applications and challenges. Procedia Computer Sci 2018;132:1263-9.
               4.  Jia X, Feng Q, Fan T, Lei Q. RFID technology and its applications in Internet of Things (IoT). Proceedings of the 2nd International
                   Conference on Consumer Electronics, Communications and Networks (CECNet), Yichang; 2012:1282-5.
               5.   Lee YM, Cheng F. Exploring the impact of RFID on supply chain dynamics. Proceedings of the 36th conference on Winter simulation;
                   2004 Dec 5-8; Washington, DC, USA; 2004. pp. 1145-52.
               6.  Wu L, Liu S, Zhao B, Wu W, Zhu B. The research of the application of the binary search algorithm of RFID system in the supermarket
                   shopping information identification. J Wireless Com Network 2019;27:1-10.
               7.   International Civil Aviation Organization. Doc 9303 - Machine readable travel documents. 7th ed. ICAO; 2015.
               8.   Avoine G, Calderoni L, Delvaux J, Maio D, Palmieri P. Passengers information in public transport and privacy: can anonymous tickets
                   prevent tracking? Int J Information Management 2014;34:682-8.
               9.   Chothia T, Smirnov V. A traceability attack against e-passports. In: Sion R, editor. Financial cryptography. Lecture notes in computer
                   science. Springer; 2010. pp. 20-34.
               10.  Ma D, Saxena N, Xiang T, Zhu Y. Location-aware and safer cards: enhancing RFID security and privacy via location sensing. IEEE Trans
                   Distributed Secure Computing 2013;10:57-69.
               11.  Yang SJ, Huang X. Certain types of M-fuzzifying matroids: a fundamental look at the security protocols in RFID and IoT. Future
                   Generation Computer Systems 2018;86:582-90.
               12.  Halevi T, Li H, Ma D, Saxena N, Voris J, et al. Context-aware defenses to RFID unauthorized reading and relay attacks. IEEE
                   Transactions Emerging Topics Computing 2013;1:307-18.
               13.  He D, Zeadally S. An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve
                   cryptography. IEEE Int Things J 2015;2:72-83.
               14.  Li N, Mu Y, Susilo W, Guo F, Varadharajan V. Vulnerabilities of an ECC-based RFID authentication scheme. Security Comm Networks
                   2015;8:3262-70.
               15.  Calderoni L, Maio D. Cloning and tampering threats in e-passports. Expert Syst Appl 2014;41:5066-70.
               16.  Gandino F, Montrucchio B, Rebaudengo M. Tampering in RFID: a survey on risks and defenses. Mobile Netw Appl 2010;15:502-16.
               17.  Gao L, Zhang L, Lin F, Ma M. Secure RFID authentication schemes based on security analysis and improvements of the USI protocol.
                   IEEE Access 2019;17:1360-6.
               18.  Aghili SF, Mala H, Kaliyar P, Conti M. SecLAP: secure and lightweight RFID authentication protocol for Medical IoT. Future Gener
                   Comput Syst 2019;101:621-34.
               19.  NXP Semiconductors: NT4H2421Gx - NTAG 424 DNA. Tech. rep., NXP (January 2019), rev. 3.0. Available from https://www.nxp.com/
                   docs/en/data-sheet/NT4H2421Gx.pdf [Last accessed on 3 Jun 2020]
               20.  International Organization for Standardization Electrotechnical Commission. Organization, Security and Commands for Interchange. 3th
                   ed. 2013.
               21.  Finkenzeller K, Muller D. RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and
                   near-field communication. 3th ed. Wiley; 2010.
               22.  NFC Forum: Type 4 Tag Operation Specification. 2011. Available from https://nfc-forum.org/product/nfc-forum-type-4-tag-specification-
                   version-1-1/ [Last accessed on 3 Jun 2020]
               23.  NFC Forum: NFC Data Exchange Format (NDEF). 2006. Available from https://nfc-forum.org/product/nfc-data-exchange-format-ndef-
                   technical-specification/ [Last accessed on 3 Jun 2020]
               24.  Daemen J, Rijmen V. The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography,
                   Springer; 2002.
               25.  Miller VS. Use of elliptic curves in cryptography. In: Williams HC, editor. Advances in Cryptology - CRYPTO’85, Proceedings.
                   CRYPTO 1985. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg; 1985;218:417-26.
               26.  NXP Semiconductors: AN12196 - NTAG 424 DNA and NTAG 424 DNA TagTamper features and hints. Tech. rep., NXP (July 2019), rev.
                   1.5. Available from https://www.nxp.com/docs/en/application-note/AN12196.pdf [Last accessed on 3 Jun 2020]
               27.  Ng CY, Susilo W, Mu Y, Safavi-Naini R. Practical RFID ownership transfer scheme. J Computer Security 2011;19:319-41.
   12   13   14   15   16   17   18   19   20   21   22