Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups |
| |
Authors: | Hung-yu Chien Ming-kuei Yeh Tzong-chen Wu Chin-i Lee |
| |
Affiliation: | [1]Department of Information Management, National Chi-Nan University [2]Department of Information Management, Nanya Institute of Technology [3]Department of Information Management, National Taiwan University of Science and Technology [4]Department of Information Management, Ling Tung University |
| |
Abstract: | A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.’s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts. |
| |
Keywords: | |
本文献已被 维普 SpringerLink 等数据库收录! |
|