PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
IEEE Transactions on Dependable and Secure Computing
On Existence Proofs for Multiple RFID Tags
PERSER '06 Proceedings of the 2006 ACS/IEEE International Conference on Pervasive Services
Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
Provably Secure Grouping-Proofs for RFID Tags
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
Computer Standards & Interfaces
NSWCTC '09 Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 01
Select-Response Grouping Proof for RFID Tags
ACIIDS '09 Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems
A RFID Grouping Proof Protocol for Medication Safety of Inpatient
Journal of Medical Systems
Two RFID-based Solutions to Enhance Inpatient Medication Safety
Journal of Medical Systems
New applications of t-functions in block ciphers and hash functions
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
Personal and Ubiquitous Computing
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety
Journal of Medical Systems
Using RFID Yoking Proof Protocol to Enhance Inpatient Medication Safety
Journal of Medical Systems
A fuzzy k-coverage approach for RFID network planning using plant growth simulation algorithm
Journal of Network and Computer Applications
Hi-index | 0.00 |
During the last years many RFID authentication protocols have been proposed with major or minor success (van Deursen and Radomirovic, 2008). Juels (2004) introduced a different and novel problem that aims to evidence that two tags have been simultaneously scanned. He called this kind of evidence a yoking-proof that is supposed to be verifiable offline. Then, some authors suggested the generalization of the proof for a larger number of tags. In this paper, we review the literature published in this research topic and show the security flaws of the proposed protocols, named RFID grouping-proofs generally. More precisely, we cryptanalyze five of the most recent schemes and we also show how our techniques can be applied to older proposals. We provide some guidelines that should be followed to design secure protocols and preclude past errors. Finally, we present a yoking-proof for low-cost RFID tags, named Kazahaya, that conforms to the proposed guidelines.