DocumentCode
493137
Title
Tree-Based RFID Yoking Proof
Author
Chien, Hung-Yu ; Liu, Shih-Bin
Author_Institution
Dept. of Inf. Manage., Nat. Chi Nan Univ., Nantou
Volume
1
fYear
2009
fDate
25-26 April 2009
Firstpage
550
Lastpage
553
Abstract
RFID (radio frequency identification) yoking proof protocol allows a verifier to collect the proof of the simultaneous presence of two tags in the communication range of a specified reader. This proof has found several interesting applications. However, in the existing RFID yoking schemes, the computational cost of identifying a tag in the back-end server is O(N), where N is the number of tags. This paper proposes a tree-based yoking-proof scheme, which employs the tree structure to organize the tags and treats the dynamically updated paths of tags as the secrets to identify the tags. This arrangement results in great improvement of only O(1) computational cost to identifying the tag.
Keywords
protocols; radiofrequency identification; telecommunication security; trees (mathematics); grouping proof; radiofrequency identification; tree-based RFID yoking proof; Access protocols; Authentication; Computational complexity; Computational efficiency; Hard disks; Information security; National security; Privacy; Radiofrequency identification; Wireless communication; RFID; grouping proof; security; tree;
fLanguage
English
Publisher
ieee
Conference_Titel
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location
Wuhan, Hubei
Print_ISBN
978-1-4244-4223-2
Type
conf
DOI
10.1109/NSWCTC.2009.316
Filename
4908326
Link To Document