Title :
Tree-Based RFID Yoking Proof
Author :
Chien, Hung-Yu ; Liu, Shih-Bin
Author_Institution :
Dept. of Inf. Manage., Nat. Chi Nan Univ., Nantou
Abstract :
RFID (radio frequency identification) yoking proof protocol allows a verifier to collect the proof of the simultaneous presence of two tags in the communication range of a specified reader. This proof has found several interesting applications. However, in the existing RFID yoking schemes, the computational cost of identifying a tag in the back-end server is O(N), where N is the number of tags. This paper proposes a tree-based yoking-proof scheme, which employs the tree structure to organize the tags and treats the dynamically updated paths of tags as the secrets to identify the tags. This arrangement results in great improvement of only O(1) computational cost to identifying the tag.
Keywords :
protocols; radiofrequency identification; telecommunication security; trees (mathematics); grouping proof; radiofrequency identification; tree-based RFID yoking proof; Access protocols; Authentication; Computational complexity; Computational efficiency; Hard disks; Information security; National security; Privacy; Radiofrequency identification; Wireless communication; RFID; grouping proof; security; tree;
Conference_Titel :
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-1-4244-4223-2
DOI :
10.1109/NSWCTC.2009.316