Using RFID Yoking Proof to Design A Supply-Chain Applications for Customs Check

نویسندگان

  • Chin-Ling Chen
  • Chun-Yi Wu
  • Fang-Yie Leu
  • Yi-Li Huang
چکیده

There are currently numerous practical applications to improve the effectiveness of Radio Frequency Identification (RFID) Systems. RFID provides an efficient identification for shipping and receiving goods. In warehouse management, RFID mechanisms can be used to check whether large quantities of goods are presented within a supply-chain system. In a supermarket, product information can be acquired without asking the clerks, one by one. The above applications are limited with regard to authentication between a single tag and server, while other applications focus on authenticating the relationships among the tags. In this paper, we use a yoking proof mechanism conforming to EPCglobal Class 1 Generation 2 Standards to improve the customs container check. Our scheme can also defend against known attacks and greatly enhance security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags

Peris-Lopez et al. recently provides some guidelines that should be followed to design a secure yoking-proof protocol [10]. In addition, conforming to those guidelines and EPC C1 G2, they presented a yoking-proof for low-cost RFID tags, named Kazahaya. However, in this letter, we scrutinize its security showing how an passive adversary can retrieve secret parameters of patient’s tag in cost of ...

متن کامل

A RFID yoking proof protocol to preserve an offline verification using the commitment disclosure

A RFID (Radio Frequency Identification) yokingproof provides a verification manner that a pair of RFID tags is scanned simultaneously by one reader device to guarantee the physical proximity of multiple objects. However, the previous studies provide the verification that requires the online verifier. The connectivity between a reader and a verifier limits the practicality of a yoking proof. In ...

متن کامل

Flaws on RFID grouping-proofs. Guidelines for future sound protocols

During the last years many RFID authentication protocols have been proposed with major or minor success (van Deursen and Radomirović, 2008). Juels (2004) introduced a different and novel problem that aims to evidence that two tags have been simultaneously scanned. He called this kind of evidence a yoking-proof that is supposed to be verifiable offline. Then, some authors suggested the generaliz...

متن کامل

On the Security of RFID Group Scanning Protocols

A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack. key words: yoking-proof, grouping-proof, co-existence-proof, relay attack

متن کامل

Privacy Threats in RFID Group Proof Schemes

RFID tag is a small and inexpensive microchip which is capable of transmitting unique identifier through wireless network in a short distance. If a group of RFID tags can be scanned simultaneously by one reader, RFID Group proof could be generated. Group proof can be used in various applications, such as good management which is usually achieved using barcode system. A lot of RFID group proof s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013