Using RFID Yoking Proof to Design A Supply-Chain Applications for Customs Check
نویسندگان
چکیده
There are currently numerous practical applications to improve the effectiveness of Radio Frequency Identification (RFID) Systems. RFID provides an efficient identification for shipping and receiving goods. In warehouse management, RFID mechanisms can be used to check whether large quantities of goods are presented within a supply-chain system. In a supermarket, product information can be acquired without asking the clerks, one by one. The above applications are limited with regard to authentication between a single tag and server, while other applications focus on authenticating the relationships among the tags. In this paper, we use a yoking proof mechanism conforming to EPCglobal Class 1 Generation 2 Standards to improve the customs container check. Our scheme can also defend against known attacks and greatly enhance security.
منابع مشابه
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
Peris-Lopez et al. recently provides some guidelines that should be followed to design a secure yoking-proof protocol [10]. In addition, conforming to those guidelines and EPC C1 G2, they presented a yoking-proof for low-cost RFID tags, named Kazahaya. However, in this letter, we scrutinize its security showing how an passive adversary can retrieve secret parameters of patient’s tag in cost of ...
متن کاملA RFID yoking proof protocol to preserve an offline verification using the commitment disclosure
A RFID (Radio Frequency Identification) yokingproof provides a verification manner that a pair of RFID tags is scanned simultaneously by one reader device to guarantee the physical proximity of multiple objects. However, the previous studies provide the verification that requires the online verifier. The connectivity between a reader and a verifier limits the practicality of a yoking proof. In ...
متن کاملFlaws on RFID grouping-proofs. Guidelines for future sound protocols
During the last years many RFID authentication protocols have been proposed with major or minor success (van Deursen and Radomirović, 2008). Juels (2004) introduced a different and novel problem that aims to evidence that two tags have been simultaneously scanned. He called this kind of evidence a yoking-proof that is supposed to be verifiable offline. Then, some authors suggested the generaliz...
متن کاملOn the Security of RFID Group Scanning Protocols
A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack. key words: yoking-proof, grouping-proof, co-existence-proof, relay attack
متن کاملPrivacy Threats in RFID Group Proof Schemes
RFID tag is a small and inexpensive microchip which is capable of transmitting unique identifier through wireless network in a short distance. If a group of RFID tags can be scanned simultaneously by one reader, RFID Group proof could be generated. Group proof can be used in various applications, such as good management which is usually achieved using barcode system. A lot of RFID group proof s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013