Class information for:
Level 1: RFID//DISTANCE BOUNDING PROTOCOL//RELAY ATTACK

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
16868 631 26.0 36%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
2771 2             RFID//ANTI COLLISION//RADIO FREQUENCY IDENTIFICATION 3146
16868 1                   RFID//DISTANCE BOUNDING PROTOCOL//RELAY ATTACK 631

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 RFID authKW 1873590 41% 15% 261
2 DISTANCE BOUNDING PROTOCOL authKW 1120153 4% 93% 25
3 RELAY ATTACK authKW 1068986 4% 82% 27
4 RFID SECURITY authKW 780692 3% 73% 22
5 MAFIA FRAUD ATTACK authKW 774252 3% 100% 16
6 GROUPING PROOF authKW 725861 2% 100% 15
7 OWNERSHIP TRANSFER authKW 559386 3% 68% 17
8 RFID AUTHENTICATION authKW 387126 1% 100% 8
9 MUTUAL AUTHENTICATION authKW 373609 6% 20% 38
10 DISTANCE FRAUD ATTACK authKW 338735 1% 100% 7

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 16311 42% 0% 263
2 Telecommunications 12880 38% 0% 239
3 Computer Science, Hardware & Architecture 3954 14% 0% 90
4 Computer Science, Theory & Methods 2840 19% 0% 119
5 Medical Informatics 2330 8% 0% 48
6 Computer Science, Software Engineering 1525 12% 0% 74
7 Engineering, Electrical & Electronic 859 23% 0% 147
8 Health Care Sciences & Services 785 8% 0% 50
9 Computer Science, Artificial Intelligence 598 9% 0% 54
10 Computer Science, Interdisciplinary Applications 198 5% 0% 34

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 DCCS 169361 1% 50% 7
2 INFORMAT COMMUN THEORY GRP ICT 96782 0% 100% 2
3 INFORMAT SECUR PRIVACY 91680 1% 32% 6
4 COSEC 72583 0% 50% 3
5 MED SAFETY ENGN 64520 0% 67% 2
6 ADV TECHNOL DEV SECT 48391 0% 100% 1
7 BLDG TECHNOL DEV 48391 0% 100% 1
8 COMMUN SECT GRP 48391 0% 100% 1
9 COMP SECUIRTY 48391 0% 100% 1
10 COS GRP 48391 0% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 JOURNAL OF MEDICAL SYSTEMS 53175 7% 3% 43
2 SECURITY AND COMMUNICATION NETWORKS 31409 5% 2% 30
3 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 12152 2% 2% 11
4 WIRELESS PERSONAL COMMUNICATIONS 11993 5% 1% 32
5 IET INFORMATION SECURITY 7350 1% 2% 7
6 IEEE PERVASIVE COMPUTING 6688 1% 2% 8
7 JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 5525 2% 1% 14
8 INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 4677 3% 1% 16
9 INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING 4663 1% 1% 7
10 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 4089 1% 2% 4

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 RFID 1873590 41% 15% 261 Search RFID Search RFID
2 DISTANCE BOUNDING PROTOCOL 1120153 4% 93% 25 Search DISTANCE+BOUNDING+PROTOCOL Search DISTANCE+BOUNDING+PROTOCOL
3 RELAY ATTACK 1068986 4% 82% 27 Search RELAY+ATTACK Search RELAY+ATTACK
4 RFID SECURITY 780692 3% 73% 22 Search RFID+SECURITY Search RFID+SECURITY
5 MAFIA FRAUD ATTACK 774252 3% 100% 16 Search MAFIA+FRAUD+ATTACK Search MAFIA+FRAUD+ATTACK
6 GROUPING PROOF 725861 2% 100% 15 Search GROUPING+PROOF Search GROUPING+PROOF
7 OWNERSHIP TRANSFER 559386 3% 68% 17 Search OWNERSHIP+TRANSFER Search OWNERSHIP+TRANSFER
8 RFID AUTHENTICATION 387126 1% 100% 8 Search RFID+AUTHENTICATION Search RFID+AUTHENTICATION
9 MUTUAL AUTHENTICATION 373609 6% 20% 38 Search MUTUAL+AUTHENTICATION Search MUTUAL+AUTHENTICATION
10 DISTANCE FRAUD ATTACK 338735 1% 100% 7 Search DISTANCE+FRAUD+ATTACK Search DISTANCE+FRAUD+ATTACK

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 CHOU, JS , (2014) AN EFFICIENT MUTUAL AUTHENTICATION RFID SCHEME BASED ON ELLIPTIC CURVE CRYPTOGRAPHY.JOURNAL OF SUPERCOMPUTING. VOL. 70. ISSUE 1. P. 75 -94 31 97% 9
2 CHEN, YL , CHOU, JS , (2015) ECC-BASED UNTRACEABLE AUTHENTICATION FOR LARGE-SCALE ACTIVE-TAG RFID SYSTEMS.ELECTRONIC COMMERCE RESEARCH. VOL. 15. ISSUE 1. P. 97 -120 35 85% 2
3 FALAHATI, A , JANNATI, H , (2016) DISTANCE BOUNDING-BASED RFID BINDING PROOF PROTOCOL TO PROTECT INPATIENT MEDICATION SAFETY AGAINST RELAY ATTACK.INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING. VOL. 22. ISSUE 2. P. 71 -83 26 93% 0
4 SUNDARESAN, S , DOSS, R , ZHOU, WL , (2015) ZERO KNOWLEDGE GROUPING PROOF PROTOCOL FOR RFID EPC C1G2 TAGS.IEEE TRANSACTIONS ON COMPUTERS. VOL. 64. ISSUE 10. P. 2994 -3008 20 100% 1
5 SUNDARESAN, S , DOSS, R , PIRAMUTHU, S , ZHOU, WL , (2014) A ROBUST GROUPING PROOF PROTOCOL FOR RFID EPC C1G2 TAGS.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 9. ISSUE 6. P. 961 -975 17 100% 4
6 DOSS, R , SUNDARESAN, S , ZHOU, WL , (2013) A PRACTICAL QUADRATIC RESIDUES BASED SCHEME FOR AUTHENTICATION AND PRIVACY IN MOBILE RFID SYSTEMS.AD HOC NETWORKS. VOL. 11. ISSUE 1. P. 383-396 17 94% 20
7 FARASH, MS , NAWAZ, O , MAHMOOD, K , CHAUDHRY, SA , KHAN, MK , (2016) A PROVABLY SECURE RFID AUTHENTICATION PROTOCOL BASED ON ELLIPTIC CURVE FOR HEALTHCARE ENVIRONMENTS.JOURNAL OF MEDICAL SYSTEMS. VOL. 40. ISSUE 7. P. - 20 77% 1
8 XIE, W , XIE, L , ZHANG, C , WANG, Q , WANG, C , TANG, CJ , (2014) TOA: A TAG-OWNER-ASSISTING RFID AUTHENTICATION PROTOCOL TOWARD ACCESS CONTROL AND OWNERSHIP TRANSFER.SECURITY AND COMMUNICATION NETWORKS. VOL. 7. ISSUE 5. P. 934-944 18 95% 1
9 AVOINE, G , CARPENT, X , HERNANDEZ-CASTRO, J , (2016) PITFALLS IN ULTRALIGHTWEIGHT AUTHENTICATION PROTOCOL DESIGNS.IEEE TRANSACTIONS ON MOBILE COMPUTING. VOL. 15. ISSUE 9. P. 2317 -2332 19 86% 0
10 DOSS, R , ZHOU, WL , SUNDARESAN, S , YU, S , GAO, LX , (2012) A MINIMUM DISCLOSURE APPROACH TO AUTHENTICATION AND PRIVACY IN RFID SYSTEMS.COMPUTER NETWORKS. VOL. 56. ISSUE 15. P. 3401 -3416 16 100% 14

Classes with closest relation at Level 1



Rank Class id link
1 18375 ANTI COLLISION//TAG IDENTIFICATION//RFID
2 10831 RFID//RADIO FREQUENCY IDENTIFICATION//INVENTORY INACCURACY
3 31672 MCELIECE CRYPTOSYSTEM//MCELIECE//GOPPA CODES
4 30929 RF FINGERPRINT//RADIO FREQUENCY FINGERPRINTING//RADIOMETRIC IDENTIFICATION
5 32726 DEVICE PAIRING//TWO CHANNEL CRYPTOGRAPHY//DEVICE ASSOCIATION
6 2433 SMART CARD//PASSWORD//KEY AGREEMENT
7 37312 GQM APPROACH//APPLICATION DRIVEN PERSPECTIVE//BLACKHOLE ATTACKS
8 21091 HARDWARE SECURITY//PHYSICAL UNCLONABLE FUNCTION//HARDWARE TROJAN
9 7906 RADIO FREQUENCY IDENTIFICATION RFID//TAG ANTENNA//CHIPLESS RFID
10 7292 BLOCK CIPHER//DIFFERENTIAL CRYPTANALYSIS//HASH FUNCTION

Go to start page