DocumentCode
2238719
Title
On Existence Proofs for Multiple RFID Tags
Author
Piramuthu, Selwyn
Author_Institution
Dept. of Decision & Inf. Sci., Florida Univ., Gainesville, FL
fYear
2006
fDate
26-29 June 2006
Firstpage
317
Lastpage
320
Abstract
The ability to securely authenticate RFID (radio-frequency identification) tags is of paramount importance in RFID-tagged applications where the integrity of the system as well its security can be compromised by an adversary. RFID tags have resource constraints including limited memory and processing capacity which restrict utilization of cryptographic primitives that have been used in other applications. We consider the case where two or more RFID tags need to be simultaneously scanned. Juels (2004) provided a proof for the simultaneous existence of two RFID tags. Saito and Sakurai (2005) later showed the proof described in Juels (2004) to be vulnerable to `replay attack´, and proposed new proofs to alleviate this problem. However, the proofs provided by Saiko and Sakurai (2005) are not immune to `replay attack.´ We propose a modified proof and provide its security analysis
Keywords
cryptography; mark scanning equipment; message authentication; radiofrequency identification; telecommunication security; transponders; multiple RFID tags; replay attack; resource constraints; security analysis; system integrity; system security; Costs; Cryptography; Data security; Immune system; Information security; Memory management; Privacy; RFID tags; Radio frequency; Radiofrequency identification;
fLanguage
English
Publisher
ieee
Conference_Titel
Pervasive Services, 2006 ACS/IEEE International Conference on
Conference_Location
Lyon
Print_ISBN
1-4244-0237-9
Type
conf
DOI
10.1109/PERSER.2006.1652252
Filename
1652252
Link To Document