PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
On Existence Proofs for Multiple RFID Tags
PERSER '06 Proceedings of the 2006 ACS/IEEE International Conference on Pervasive Services
Provably Secure Grouping-Proofs for RFID Tags
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification
Computer Standards & Interfaces
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
Information Security Applications
Lightweight Secure Search Protocols for Low-cost RFID Systems
ICDCS '09 Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems
A RFID Grouping Proof Protocol for Medication Safety of Inpatient
Journal of Medical Systems
Lightweight mutual authentication and ownership transfer for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Flaws on RFID grouping-proofs. Guidelines for future sound protocols
Journal of Network and Computer Applications
Two RFID-based Solutions to Enhance Inpatient Medication Safety
Journal of Medical Systems
Low Cost RFID Real Lightweight Binding Proof Protocol for Medication Errors and Patient Safety
Journal of Medical Systems
Patient Safety Through RFID: Vulnerabilities in Recently Proposed Grouping Protocols
Journal of Medical Systems
RFID-Enabled Healthcare Applications, Issues and Benefits: An Archival Analysis (1997---2011)
Journal of Medical Systems
Hi-index | 0.00 |
Quite recently, Yu et al. presented a real lightweight binding proof protocol to guard patient safety and prevent medication errors. In this paper, we first show their protocol is still vulnerable to impersonation attacks. Thereafter we propose a new lightweight binding proof protocol to overcome these weaknesses and securely achieve the goal of proving that two tags exist in the field simultaneously.