DocumentCode :
514443
Title :
n-Time protocol for multiple RFID tags authentication
Author :
Cho, Chang-Hyun ; Lee, Jaesik ; Kim, Jae-Woo ; Jun, Moon-Seog
Author_Institution :
Dept. of Comput. Sci., SoongSil Univ., Seoul, South Korea
Volume :
2
fYear :
2010
fDate :
7-10 Feb. 2010
Firstpage :
1621
Lastpage :
1624
Abstract :
Ari Juels proposed yoking-proof protocol for authenticating multiple tags using RFID system. Then, one-time yoking-proof protocol, which is a lightweight version using minimalist MACs was proposed. However, Ari Juels´s protocol is vulnerable to replay attack during the handshake process for authentication between tags. Some solutions have been proposed for making up for the vulnerability but those also had some weaknesses in some ways. In this study, a protocol has been proposed for making up for the vulnerability of one-time yoking-proof protocol while allowing multiple authentications instead of one, depending on the tag capacity.
Keywords :
message authentication; protocols; radiofrequency identification; telecommunication security; RFID system; handshake process; minimalist MAC; n-time protocol; one-time yoking-proof protocol; radiofrequency identification tags authentication; replay attack; tag capacity; Costs; Counting circuits; Cryptographic protocols; Media Access Protocol; Message authentication; Protection; RFID tags; Radio frequency; Radiofrequency identification; Security; Authentication; MAC; Multiple; RFID; n-Time;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Communication Technology (ICACT), 2010 The 12th International Conference on
Conference_Location :
Phoenix Park
ISSN :
1738-9445
Print_ISBN :
978-1-4244-5427-3
Type :
conf
Filename :
5440341
Link To Document :
بازگشت