Abstract
How can a RFID (Radio Frequency Identification Devices) system prove that two or more RFID tags are in the same location? Previous researchers have proposed yoking-proof and grouping-proof techniques to address this problem – and when these turned out to be vulnerable to replay attacks, a new existence-proof technique was proposed. We critique this class of existence-proofs and show it has three problems: (a) a race condition when multiple readers are present; (b) a race condition when multiple tags are present; and (c) a problem determining the number of tags. We present two new proof techniques, a secure timestamp proof (secTS-proof) and a timestamp-chaining proof (chaining-proof) that avoid replay attacks and solve problems in previously proposed techniques.
This research was supported in part with funding from the iCAST project NSC95-3114-P-001-002-Y02 in Taiwan, from the US National Science Foundation, from the US Air Force Office of Scientific Research, and from the Taiwanese National Science Council. The opinions expressed in this opinion are solely those of the authors and do not necessarily reflect the opinions of any funding sponsor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shepard, S.: RFID: Radio Frequency Identification. McGraw-Hill, New York (2005)
Juels, A.: Strengthening EPC tags against cloning. In: Proceedings of the 4th ACM Workshop on Wireless Wecurity, pp. 67–76 ( 2005)
Juels, A.: Yoking-proofs for RFID tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. 2004, pp. 138–143 (2004)
Saito, J., Sakurai, K.: Grouping proof for RFID tags. In: Proceedings of the 19th IEEE International Conference on Advanced Information Networking and Applications, pp. 621–624 ( 2005)
Piramuthu, S.: On existence proofs for multiple RFID tags. In: Proceedings of the ACS/IEEE International Conference on Pervasive Services, pp. 317–320 ( 2006)
Haber, S., Stornetta, W.: How to time-stamp a digital document. Journal of Cryptology 3(2), 99–111 (1991)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, CC., Lai, YC., Tygar, J.D., Yang, CK., Chiang, CL. (2007). Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags. In: Chang, K.CC., et al. Advances in Web and Network Technologies, and Information Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72909-9_70
Download citation
DOI: https://doi.org/10.1007/978-3-540-72909-9_70
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72908-2
Online ISBN: 978-3-540-72909-9
eBook Packages: Computer ScienceComputer Science (R0)