Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups

被引:18
作者
Cho, Jung-Sik [1 ]
Yeo, Sang-Soo [2 ]
Hwang, Suchul [3 ]
Rhee, Sang-Yong [4 ]
Kim, Sung Kwon [1 ]
机构
[1] Chung Ang Univ, Sch Engn & Comp Sci, Seoul 156756, South Korea
[2] Kyushu Univ, Dept Comp Sci & Commun Engn, Fukuoka, Japan
[3] Inha Tech Coll, Dept Syst & Comp Engn, Incheon, South Korea
[4] Kyungnam Univ, Dept Comp Sci & Engn, Masan, South Korea
来源
2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3 | 2008年
关键词
D O I
10.1109/WAINA.2008.204
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The RFID system is a contactless automatic identification system that identifies tags attached on goods through radio frequency communication. This system is expected to supplant barcode systems, the contact reading technique that is most widely used at present. The RFID system can be applied in a variety of areas. Among those, Ari Juels proposed an environment to prove that a pair of tags has been scanned simultaneously. And he presented a "yoking proof" protocol for this. But the yoking-proof protocol is vulnerable to replay attack. Although modified yoking-proof protocols for alleviating this drawback have been proposed, they are not immune to replay attack, either In this paper, we analyze problems of existing yoking-proof protocols and present a new protocol, which will make replay attack difficult, based on this analysis. We have also extend this protocol so that it can provide yoking proofs for a tag group, including a multiple number of tags.
引用
收藏
页码:1591 / +
页数:2
相关论文
共 8 条
[1]  
[Anonymous], IEEE INT C PERV SERV
[2]  
Avoine G, 2005, LECT NOTES COMPUT SC, V3570, P125
[3]  
Finkenzeller K., 2003, RFID HDB
[4]  
Juels A, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P138
[5]   Selecting cryptographic key sizes [J].
Lenstra, AK ;
Verheul, ER .
JOURNAL OF CRYPTOLOGY, 2001, 14 (04) :255-293
[6]  
Liu ZY, 2006, CONSUM COMM NETWORK, P620
[7]  
Saito J, 2005, AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, P621
[8]  
Weis S., 2003, LECT NOTES COMPUTER, V2802, P454