n-time protocol for multiple RFID tags authentication

  • Authors:
  • Chang-Hyun Cho;Jaesik Lee;Jae-Woo Kim;Moon-Seog Jun

  • Affiliations:
  • Dept. of Computer Science, SoongSil University, Seoul, South Korea;Dept. of Computer Science, SoongSil University, Seoul, South Korea;Dept. of Computer Science, SoongSil University, Seoul, South Korea;Dept. of Computer Science, SoongSil University, Seoul, South Korea

  • Venue:
  • ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Ari Juels proposed yoking-proof protocol for authenticating multiple tags using RFID system. Then, one-time yoking-proof protocol, which is a lightweight version using minimalist MACs was proposed. However, Ari Juels's protocol is vulnerable to replay attack during the handshake process for authentication between tags. Some solutions have been proposed for making up for the vulnerability but those also had some weaknesses in some ways. In this study, a protocol has been proposed for making up for the vulnerability of one-time yoking-proof protocol while allowing multiple authentications instead of one, depending on the tag capacity.