Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups |
| |
Authors: | Hung-yu Chien Ming-kuei Yeh Tzong-chen Wu Chin-i Lee |
| |
Institution: | [1]Department of Information Management, National Chi-Nan University [2]Department of Information Management, Nanya Institute of Technology [3]Department of Information Management, National Taiwan University of Science and Technology [4]Department of Information Management, Ling Tung University |
| |
Abstract: | A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the
range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting
applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho
et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.’s schemes are still
vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind
these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new
RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts. |
| |
Keywords: | |
本文献已被 维普 SpringerLink 等数据库收录! |
|