上海交通大学学报(英文版) ›› 2011, Vol. 16 ›› Issue (5): 604-609.doi: 10.1007/s12204-011-1196-2
CHIEN Hung-yu (简宏宇), YEH Ming-kuei (叶明贵), WU Tzong-chen (吴宗成), LEE Chin-i (李静怡)
CHIEN Hung-yu (简宏宇), YEH Ming-kuei (叶明贵), WU Tzong-chen (吴宗成), LEE Chin-i (李静怡)
摘要: Abstract: A radio frequency identification (RFID) yoking proof scheme can generate
proofs of simultaneous presence of two tags in the range of a specified
reader so that an off-line verifier can verify the proofs later. This proof
has found several interesting applications. However, many existing RFID
yoking schemes are vulnerable to replay attacks. To overcome the weaknesses,
Cho et al. proposed a new RFID yoking proof protocol and a new grouping
protocol. Unfortunately, Cho et al.'s schemes are still vulnerable to replay
attacks. In this paper, in addition to demonstrating weaknesses, we further
discuss the rationale behind these weaknesses to provide a guide line for
designing secure RFID yoking schemes. Based on the guide line, we propose a
new RFID yoking scheme and a new RFID grouping scheme. Performance
evaluation shows that our scheme outperforms its counterparts.
中图分类号: