排序方式: 共有1条查询结果,搜索用时 0 毫秒
1
1.
A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the
range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting
applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho
et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.’s schemes are still
vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind
these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new
RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts. 相似文献
1