• DocumentCode
    2238719
  • Title

    On Existence Proofs for Multiple RFID Tags

  • Author

    Piramuthu, Selwyn

  • Author_Institution
    Dept. of Decision & Inf. Sci., Florida Univ., Gainesville, FL
  • fYear
    2006
  • fDate
    26-29 June 2006
  • Firstpage
    317
  • Lastpage
    320
  • Abstract
    The ability to securely authenticate RFID (radio-frequency identification) tags is of paramount importance in RFID-tagged applications where the integrity of the system as well its security can be compromised by an adversary. RFID tags have resource constraints including limited memory and processing capacity which restrict utilization of cryptographic primitives that have been used in other applications. We consider the case where two or more RFID tags need to be simultaneously scanned. Juels (2004) provided a proof for the simultaneous existence of two RFID tags. Saito and Sakurai (2005) later showed the proof described in Juels (2004) to be vulnerable to `replay attack´, and proposed new proofs to alleviate this problem. However, the proofs provided by Saiko and Sakurai (2005) are not immune to `replay attack.´ We propose a modified proof and provide its security analysis
  • Keywords
    cryptography; mark scanning equipment; message authentication; radiofrequency identification; telecommunication security; transponders; multiple RFID tags; replay attack; resource constraints; security analysis; system integrity; system security; Costs; Cryptography; Data security; Immune system; Information security; Memory management; Privacy; RFID tags; Radio frequency; Radiofrequency identification;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Pervasive Services, 2006 ACS/IEEE International Conference on
  • Conference_Location
    Lyon
  • Print_ISBN
    1-4244-0237-9
  • Type

    conf

  • DOI
    10.1109/PERSER.2006.1652252
  • Filename
    1652252