期刊文献+

Comments on Enhanced Yoking Proof Protocols for Radio Frequency Identification Tags and Tag Groups

Comments on Enhanced Yoking Proof Protocols for Radio Frequency Identification Tags and Tag Groups
原文传递
导出
摘要 A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.'s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts. A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.'s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期604-609,共6页 上海交通大学学报(英文版)
基金 the National Science Council(No. NSC99-2218-E-260-002)
关键词 radio frequency identification (RFID) yoking AUTHENTICATION replay attack GROUPING radio frequency identification (RFID), yoking, authentication, replay attack, grouping
  • 相关文献

参考文献11

  • 1OGATA S,ISHIDA J,SASANO T.Optical sensor array in an artificial compound eye.Optical Engineering,1994,33(11):3649.
  • 2AVOINE G, DYSLI E, OECHSLIN P. Reducing time com- plexity in RFID systems [C]// The 12th Annual Work- shop on Selected Areas in Cryptography. Kingston, Canada: Springer-Verlag, 2005: 291-306.
  • 3CHIEN H Y, LAIH C S. ECC-based lightweight au- thentication protocol with un-traceability for low-cost RFIDs [J]. Journal of Parallel and Distributed Com- puting, 2009, 69(10): 848-853.
  • 4JUELS A. Yoking proofs for RFID tag [C]// Proceed- ings of the Second IEEE Annual Conference on Per- vasive Computing and Communications Workshops. Washington, DC, USA: IEEE, 2004: 138-142.
  • 5SAITO J, SAKURAI K. Grouping proof for RFID tags [C]// 19th International Conference on Advanced In-formation Networking and Applications. Taipei: IEEE, 2005: 621-624.
  • 6DIRAMUTHU S. On existence proofs for multiple RFID tags [C]// IEEE International Conference on Per- vasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. Lyon, France: IEEE, 2006: 317-320.
  • 7PERIS-LOPEZ P, HERNANDEZ-CASTRO J, ESTEVEZ- TAPIADOR J M, et al. Solving the simultaneous scan- ning problem anonymously: Clumping proofs for RFID tags [C]// Proceedings of the third International Work- shop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. Istanbul, Turkey: IEEE, 2007: 55-60.
  • 8CHO S S, YEO S, HWANG S Y, et al. Enhanced yoking proof protocols for RFID tags and tag groups [C]// Proceedings of the 22nd International Conference on Advanced Information Networking and Applications. Okinawa: IEEE, 2008: 1591-1596.
  • 9LENG X, LIEN Y, MAYES K, et al. Select-response grouping proof for RFID tags [C]// Proceedings of the First Asian Conference on Intelligent Information and Database Systems. Dong Hoi City, Vietnam: IEEE, 2009: 73-77.
  • 10CHIEN H Y, Wu T C. Making yoking proof more ef- ficient and practical [R]. Nantou: National Chi-Nan University, 2010.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部