DocumentCode
514443
Title
n-Time protocol for multiple RFID tags authentication
Author
Cho, Chang-Hyun ; Lee, Jaesik ; Kim, Jae-Woo ; Jun, Moon-Seog
Author_Institution
Dept. of Comput. Sci., SoongSil Univ., Seoul, South Korea
Volume
2
fYear
2010
fDate
7-10 Feb. 2010
Firstpage
1621
Lastpage
1624
Abstract
Ari Juels proposed yoking-proof protocol for authenticating multiple tags using RFID system. Then, one-time yoking-proof protocol, which is a lightweight version using minimalist MACs was proposed. However, Ari Juels´s protocol is vulnerable to replay attack during the handshake process for authentication between tags. Some solutions have been proposed for making up for the vulnerability but those also had some weaknesses in some ways. In this study, a protocol has been proposed for making up for the vulnerability of one-time yoking-proof protocol while allowing multiple authentications instead of one, depending on the tag capacity.
Keywords
message authentication; protocols; radiofrequency identification; telecommunication security; RFID system; handshake process; minimalist MAC; n-time protocol; one-time yoking-proof protocol; radiofrequency identification tags authentication; replay attack; tag capacity; Costs; Counting circuits; Cryptographic protocols; Media Access Protocol; Message authentication; Protection; RFID tags; Radio frequency; Radiofrequency identification; Security; Authentication; MAC; Multiple; RFID; n-Time;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Technology (ICACT), 2010 The 12th International Conference on
Conference_Location
Phoenix Park
ISSN
1738-9445
Print_ISBN
978-1-4244-5427-3
Type
conf
Filename
5440341
Link To Document