|
|
Comments on Enhanced Yoking Proof Protocols for Radio Frequency
Identification Tags and Tag Groups |
CHIEN Hung-yu (简宏宇), YEH Ming-kuei (叶明贵), WU Tzong-chen (吴宗成), LEE Chin-i (李静怡) |
(1. Department of Information Management, National Chi-Nan University, Nantou
54561;
2. Department of Information Management, Nanya Institute of Technology,
Taoyuan 32091;
3. Department of Information Management, National Taiwan University of
Science and Technology, Taipei 10607;
4. Department of Information Management, Ling Tung University, Taichung
40852) |
|
|
Abstract Abstract: A radio frequency identification (RFID) yoking proof scheme can generate
proofs of simultaneous presence of two tags in the range of a specified
reader so that an off-line verifier can verify the proofs later. This proof
has found several interesting applications. However, many existing RFID
yoking schemes are vulnerable to replay attacks. To overcome the weaknesses,
Cho et al. proposed a new RFID yoking proof protocol and a new grouping
protocol. Unfortunately, Cho et al.'s schemes are still vulnerable to replay
attacks. In this paper, in addition to demonstrating weaknesses, we further
discuss the rationale behind these weaknesses to provide a guide line for
designing secure RFID yoking schemes. Based on the guide line, we propose a
new RFID yoking scheme and a new RFID grouping scheme. Performance
evaluation shows that our scheme outperforms its counterparts.
|
Received: 10 March 2011
Published: 29 October 2011
|
|
Fund: the National Science Council (No.NSC 99-2218-E-260-002) |
Corresponding Authors:
CHIEN Hung-yu (简宏宇),
E-mail: hychien@ncnu.edu.tw
|
|
|
|
[1] |
CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非), WANG Yong-tao (王永涛). Identity-Based Key-Insulated Proxy Signature Without Random Oracles[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 557-566. |
[2] |
QIU Wei-dong (邱卫东), JIN Ling (金 凌), YANG Xiao-niu (杨小牛), YANG Hong-wa (杨红娃). Bit Stream Oriented Enumeration Tree Pruning Algorithm [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 567-570. |
[3] |
WAN Zhong-mei (万中美), Meng Xiang-qin (孟祥芹), HONG Xuan (洪 璇). Certificateless Strong Key-Insulated Signature Without Random Oracles[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 571-576. |
[4] |
TSO Ray-lin (左瑞麟), KIM Cheonshik, YI Xun (易 训). Certificateless Message Recovery Signatures Providing Girault's Level-3 Security[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 577-585. |
|
|
|
|