Skip to main content
Log in

Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.’s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Juels A. Strengthening EPC tag against cloning [C]// Proceedings of 6th International Conference on Web Information Systems Engineering. NY, USA: Springer-Verlag, 2005: 67–76.

    Google Scholar 

  2. Avoine G, Dysli E, Oechslin P. Reducing time complexity in RFID systems [C]// The 12th Annual Workshop on Selected Areas in Cryptography. Kingston, Canada: Springer-Verlag, 2005: 291–306.

    Google Scholar 

  3. Chien H Y, Laih C S. ECC-based lightweight authentication protocol with un-traceability for low-cost RFIDs [J]. Journal of Parallel and Distributed Computing, 2009, 69(10): 848–853.

    Article  Google Scholar 

  4. Juels A. Yoking proofs for RFID tag [C]// Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. Washington, DC, USA: IEEE, 2004: 138–142.

    Chapter  Google Scholar 

  5. Saito J, Sakurai K. Grouping proof for RFID tags [C]// 19th International Conference on Advanced Information Networking and Applications. Taipei: IEEE, 2005: 621–624.

    Google Scholar 

  6. Piramuthu S. On existence proofs for multiple RFID tags [C]// IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. Lyon, France: IEEE, 2006: 317–320.

    Google Scholar 

  7. Peris-Lopez P, Hernandez-Castro J, Estevez-Tapiador J M, et al. Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags [C]// Proceedings of the third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. Istanbul, Turkey: IEEE, 2007: 55–60.

    Chapter  Google Scholar 

  8. Cho S S, Yeo S, Hwang S Y, et al. Enhanced yoking proof protocols for RFID tags and tag groups [C]// Proceedings of the 22nd International Conference on Advanced Information Networking and Applications. Okinawa: IEEE, 2008: 1591–1596.

    Google Scholar 

  9. Leng X, Lien Y, Mayes K, et al. Select-response grouping proof for RFID tags [C]// Proceedings of the First Asian Conference on Intelligent Information and Database Systems. Dong Hoi City, Vietnam: IEEE, 2009: 73–77.

    Chapter  Google Scholar 

  10. Chien H Y, Wu T C. Making yoking proof more efficient and practical [R]. Nantou: National Chi-Nan University, 2010.

    Google Scholar 

  11. Lo N W, Yeh K H. Anonymous coexistence proofs for RFID tags [J]. Journal of Information Science and Engineering, 2010, 26: 1213–1230.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hung-yu Chien  (简宏宇).

Additional information

Foundation item: the National Science Council (No. NSC99-2218-E-260-002)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chien, Hy., Yeh, Mk., Wu, Tc. et al. Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups. J. Shanghai Jiaotong Univ. (Sci.) 16, 604–609 (2011). https://doi.org/10.1007/s12204-011-1196-2

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-011-1196-2

Key words

CLC number

Navigation