Journal of shanghai Jiaotong University (Science) ›› 2011, Vol. 16 ›› Issue (5): 604-609.doi: 10.1007/s12204-011-1196-2

• Articles • Previous Articles     Next Articles

Comments on Enhanced Yoking Proof Protocols for Radio Frequency
Identification Tags and Tag Groups

Comments on Enhanced Yoking Proof Protocols for Radio Frequency
Identification Tags and Tag Groups

CHIEN Hung-yu (简宏宇),    YEH Ming-kuei (叶明贵),    WU Tzong-chen (吴宗成),    LEE Chin-i (李静怡)   

  1. (1. Department of Information Management, National Chi-Nan University, Nantou
    54561; 2. Department of Information Management, Nanya Institute of Technology,
    Taoyuan 32091; 3. Department of Information Management, National Taiwan University of
    Science and Technology, Taipei 10607; 4. Department of Information Management, Ling Tung University, Taichung
    40852)
  2. (1. Department of Information Management, National Chi-Nan University, Nantou
    54561; 2. Department of Information Management, Nanya Institute of Technology,
    Taoyuan 32091; 3. Department of Information Management, National Taiwan University of
    Science and Technology, Taipei 10607; 4. Department of Information Management, Ling Tung University, Taichung
    40852)
  • Received:2011-03-10 Online:2011-10-29 Published:2011-10-20
  • Contact: CHIEN Hung-yu (简宏宇), E-mail:hychien@ncnu.edu.tw
  • Supported by:

    the National Science Council (No.NSC 99-2218-E-260-002)

Abstract: Abstract:  A radio frequency identification (RFID) yoking proof scheme can generate
proofs of simultaneous presence of two tags in the range of a specified
reader so that an off-line verifier can verify the proofs later. This proof
has found several interesting applications. However, many existing RFID
yoking schemes are vulnerable to replay attacks. To overcome the weaknesses,
Cho et al. proposed a new RFID yoking proof protocol and a new grouping
protocol. Unfortunately, Cho et al.'s schemes are still vulnerable to replay
attacks. In this paper, in addition to demonstrating weaknesses, we further
discuss the rationale behind these weaknesses to provide a guide line for
designing secure RFID yoking schemes. Based on the guide line, we propose a
new RFID yoking scheme and a new RFID grouping scheme. Performance
evaluation shows that our scheme outperforms its counterparts.

Key words:

 radio frequency identification (RFID)| yoking|
authentication| replay attack, grouping

摘要: Abstract:  A radio frequency identification (RFID) yoking proof scheme can generate
proofs of simultaneous presence of two tags in the range of a specified
reader so that an off-line verifier can verify the proofs later. This proof
has found several interesting applications. However, many existing RFID
yoking schemes are vulnerable to replay attacks. To overcome the weaknesses,
Cho et al. proposed a new RFID yoking proof protocol and a new grouping
protocol. Unfortunately, Cho et al.'s schemes are still vulnerable to replay
attacks. In this paper, in addition to demonstrating weaknesses, we further
discuss the rationale behind these weaknesses to provide a guide line for
designing secure RFID yoking schemes. Based on the guide line, we propose a
new RFID yoking scheme and a new RFID grouping scheme. Performance
evaluation shows that our scheme outperforms its counterparts.

关键词:

 radio frequency identification (RFID)| yoking|
authentication| replay attack, grouping

CLC Number: