[1]Mohd S, Karan S, Pramod K M, et al. URASP: An ultralightweight RFID authentication scheme using permutation operation[J]. PeertoPeer Networking Application, 2021, 14(6): 737757[2]Huang K K, Liu Y L, Yin X C. Ultralightweight RFID mutual authentication protocol based on regeneration transformation[J]. Journal of Computer Applications, 2019, 39(1): 118125[3]Mujahid U,NajamulIslam M,Sarwar S. A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP[J]. Wireless Personal Communication, 2017, 94(3): 725744[4]Paolo D, Roberto D P. Design weaknesses in recent ultralightweight RFID authentication protocols[C] ICT Systems Security and Privacy Protection. Berlin: Springer, 2018: 317[5]Liu Y,Ezerman M, Wang H. Double verification protocol via secret sharing for lowcost RFID tags[J]. Future Generation Computer Systems, 2019, 90(1): 118128[6]Safkhani M, Rostampour S, Bendavid Y, et al. Improving RFIDIoTbased generalized ultralightweight mutual authentication protocols[J]. Information Security Technical Report, 2022, 6(7): 103109[7]Miller S P, Whalen M W, Cofer D D. Software model checking takes off[J]. Communications of the ACM, 2010, 53(2): 5864[8]Jiang H, He Q. A formal verification method for securityprotocol[J]. The Electronic World, 2019 (2): 5657[9]Navarrette J, Shankar S, Zhang X, et al. Formal modeling and analysis of multirogue backoff manipulation attacks in unlicensed networks[C] Proc of the 16 Int Conf on the Design of Reliable Communication Networks. Piscataway, NJ: IEEE, 2020: 17[10]Zhou Y, Yu L. An BAN logic analysis method based onyahalom protocol[J]. Revista De La Facultad De Ingenieria, 2016, 32(12): 134142[11]Li J, Zhou Z, Wang P. Cryptanalysis of the LMAP protocol: A lowcost RFID authentication protocol[C] Proc of Control and Decision Conference (CCDC). Piscataway, NJ: IEEE, 2017: 72927297[12]Dolev D, Tao A. On the security of public key protocols[J]. IEEE Trans on Information Theory, 1983, 29(2): 198208 |