Browse > Article

Strong Yoking Proof Protocols for RFID Tags  

Cho, Jung-Sik (중앙대학교 컴퓨터공학부 알고리즘 및 정보보호 연구실)
Yeo, Sang-Soo (규슈대학교 정보공학부)
Kim, Sung-Kwon (중앙대학교 컴퓨터공학부 알고리즘 및 정보보호 연구실)
Abstract
The RFID system is a non-contact automatic identification system that identifies tags through a reading device by attaching small, inexpensive tags on goods. This system is expected to supplant barcodes, the contactless reading technique that is most widely used at present. The RFID system can be applied in a variety of areas. Among those, Ari Juels proposed an environment to prove that a pair of tags has been scanned simultaneously And he presented a yoking proof protocol for this. But the yoking-proof protocol is vulnerable to replay attack. Although modified yoking-proof protocols for alleviating this drawback have been proposed, they are not immune to replay attack, either. In this paper, we analyze problems of existing yoking-proof protocols and present a new protocol, which will make replay attack difficult, based on this analysis. We have also extend this protocol so that it can provide yoking proofs for n tags.
Keywords
RFID; Yoking proof; Timestamp; Random number; Replay attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Finkenzeller, RFID Handbook, John Wiley& Sons, 2002
2 A. Juels, 'Yoking Proof' for RFID Tags', IEEE Computer Society, Proceedings of the First International Workshop on Pervasive Computing and Communication Security - PerSec 2004, pp.138-143, 2004
3 J. Saito and K. Sakurai, 'Grouping Proof for RFID Tags', IEEE Computer Society, Proceeding of the 19th International Conference on Advanced Information Networking and Applications(AINA'05), vol 2, pp. 621-624, 2005
4 A. Lenstra and E. Verheul, 'Selecting Cryptographic Key Sizes', Journal of Cryptography, vol 14, number 4, pp.255-293, 2001
5 G. Avoine and P. Oechslin, 'RFID Traceability: A Multilayer Problem', Springer- Verlag, Financial Cryptography - 0FC'05, LNCS, vol 3570, pp.125-140, 2005
6 Selwyn and Priamuhtu, 'On Existence Proofs for Multiple RFID tags', IEEE Computer Society, IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006, pp.317-320, 2006
7 S. Weis, S. Sarma, R. Rivest, and D. Engels, 'Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems', Springer-Verlag, International Conference on Security in Pervasive Computing - SPC 2003, LNCS, Vol 2802, pp. 454-469, 2004
8 Zhaoyn Liu and Dichao Peng, 'True random number generator in RFID systems against traceability', IEEE Computer Society, Consumer Communication and Networking Conference, vol 1, pp.620-624, January 2006
9 T. Dimitriou, 'A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks', IEEE Computer Society, Proceeding of IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm, pp.59-66, 2005