• DocumentCode
    514443
  • Title

    n-Time protocol for multiple RFID tags authentication

  • Author

    Cho, Chang-Hyun ; Lee, Jaesik ; Kim, Jae-Woo ; Jun, Moon-Seog

  • Author_Institution
    Dept. of Comput. Sci., SoongSil Univ., Seoul, South Korea
  • Volume
    2
  • fYear
    2010
  • fDate
    7-10 Feb. 2010
  • Firstpage
    1621
  • Lastpage
    1624
  • Abstract
    Ari Juels proposed yoking-proof protocol for authenticating multiple tags using RFID system. Then, one-time yoking-proof protocol, which is a lightweight version using minimalist MACs was proposed. However, Ari Juels´s protocol is vulnerable to replay attack during the handshake process for authentication between tags. Some solutions have been proposed for making up for the vulnerability but those also had some weaknesses in some ways. In this study, a protocol has been proposed for making up for the vulnerability of one-time yoking-proof protocol while allowing multiple authentications instead of one, depending on the tag capacity.
  • Keywords
    message authentication; protocols; radiofrequency identification; telecommunication security; RFID system; handshake process; minimalist MAC; n-time protocol; one-time yoking-proof protocol; radiofrequency identification tags authentication; replay attack; tag capacity; Costs; Counting circuits; Cryptographic protocols; Media Access Protocol; Message authentication; Protection; RFID tags; Radio frequency; Radiofrequency identification; Security; Authentication; MAC; Multiple; RFID; n-Time;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Communication Technology (ICACT), 2010 The 12th International Conference on
  • Conference_Location
    Phoenix Park
  • ISSN
    1738-9445
  • Print_ISBN
    978-1-4244-5427-3
  • Type

    conf

  • Filename
    5440341