2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technolog 2008
DOI: 10.1109/ecticon.2008.4600536
|View full text |Cite
|
Sign up to set email alerts
|

An improved proof for RFID tags

Abstract: Abstract-An RFID system consists of an RFID reader, a server connected to a database, and RFID tags attached to the objects needed to be identified. We are interested in the case where two tags are needed to be simultaneously scanned in a reader's field, for which many protocols have been proposed in literature. They however are all insecure for the special case, where an adversary, acting as a reader, can penetrate the server and access data stored in the server. In this paper, we propose a protocol to remedy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Based on the previous paper, an improved proof for RFID tags has been proposed [6][7], as illustrated in Figure 3. The protocol begins when the reader receives a random data r from the server.…”
Section: An Improved Proofmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the previous paper, an improved proof for RFID tags has been proposed [6][7], as illustrated in Figure 3. The protocol begins when the reader receives a random data r from the server.…”
Section: An Improved Proofmentioning
confidence: 99%
“…Cho and Yeo presented "Enhanced Yoking Proof Protocol" and said that it makes replay attack difficult [5]. And then an improved proof for RFID tags has been proposed which requires the reader legality should be authenticated [6][7].…”
Section: Introductionmentioning
confidence: 99%
“…Table 2 shows that the grouping proof proposed in this study can protect against all major attacks currently in use. In the method proposed by Saito et al [ 13 ], the tags generate messages but do not use random numbers that change for every message; consequently, malicious users can generate counterfeit tags by replaying old messages to generate grouping proofs [ 18 , 27 , 31 ]. The method proposed by Huang and Ku [ 44 ] can be exploited by replacing parts of the pieces of proof to forge tags [ 26 , 45 ] and authentication can be avoided if the verifier has listed tag as redundant in its cyclic redundancy check.…”
Section: Security and Performance Analysismentioning
confidence: 99%
“…In addition, parallel computing accelerates the generation of grouping proofs. Jantarapatin, Mitrpant, Tantibundhit, Nuamcherm, and Kovintavewat [ 30 ] and Nuamcherm, Kovintavewat, Tantibundhit, Ketprom, and Mitrpant [ 31 ] have improved the security of message requests for grouping proofs by enabling mobile readers to directly broadcast the random number incorporated in the tags. All tags must simultaneously use both the key shared by the verification server and encrypt to obtain the random number sent by the reader in order to obtain protocol for generating the pieces of proof.…”
Section: Introductionmentioning
confidence: 99%
“…Later, Piramuthu proposed a "Modified proof" [6] but it is still vulnerable to the attack if the adversary knows the nonce sent by the server. Recently, we proposed a proof [1], which is more secure and can resolve this problem. In this consecutive paper, we analyse the efficiency and security of these authentication schemes in terms of communication bandwidth and the size of memories used for the scheme, computation cost and the number of queries that the adversary requires to perform the attack.…”
Section: Introductionmentioning
confidence: 96%