首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups
Authors:Hung-yu Chien  Ming-kuei Yeh  Tzong-chen Wu  Chin-i Lee
Institution:[1]Department of Information Management, National Chi-Nan University [2]Department of Information Management, Nanya Institute of Technology [3]Department of Information Management, National Taiwan University of Science and Technology [4]Department of Information Management, Ling Tung University
Abstract:A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.’s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts.
Keywords:
本文献已被 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号