DOI: 10.1007/978-3-540-72909-9_70
|View full text |Cite
|
Sign up to set email alerts
|

Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags

Abstract: Abstract. How can a RFID (Radio Frequency Identification Devices) system prove that two or more RFID tags are in the same location? Previous researchers have proposed yoking-proof and grouping-proof techniques to address this problem -and when these turned out to be vulnerable to replay attacks, a new existence-proof technique was proposed. We critique this class of existence-proofs and show it has three problems: (a) a race condition when multiple readers are present; (b) a race condition when multiple tags a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(50 citation statements)
references
References 5 publications
0
50
0
Order By: Relevance
“…Lin et al 7 pointed out that Piramuthu's protocol 3 suffers from interference problem when multiple readers are represented. To counter the problem, Lin et al proposed both online and offline grouping-proof protocols 7 which are variants of timestamp-based yoking proof to avoid race conditions. In both schemes tag anonymity and forward security cannot be guaranteed and they cannot defend against DOP attack.…”
Section: Review Of Existing Protocolsmentioning
confidence: 99%
See 3 more Smart Citations
“…Lin et al 7 pointed out that Piramuthu's protocol 3 suffers from interference problem when multiple readers are represented. To counter the problem, Lin et al proposed both online and offline grouping-proof protocols 7 which are variants of timestamp-based yoking proof to avoid race conditions. In both schemes tag anonymity and forward security cannot be guaranteed and they cannot defend against DOP attack.…”
Section: Review Of Existing Protocolsmentioning
confidence: 99%
“…In the previous section, we show the analysis to recent schemes [1][2][3][4][5][6][7][8] . Then we summarize the common weakness of those schemes as follows.…”
Section: Common Weakness Of Existing Rfid Groupingproofsmentioning
confidence: 99%
See 2 more Smart Citations
“…The attacker starts to intervene in step P3 as follows: [4]. The main idea of Lin et al's protocol is to encrypt the timestamp before sending to the reader so that attackers cannot collect MAC on different timestamp values from tags.…”
Section: Relay Attack On Piramuthu's Protocolmentioning
confidence: 99%