Improved yoking proof protocols for preserving anonymity

Hyoungmin M. Ham, Jonghyup H. Lee, Jooseok S. Song

Research output: Contribution to journalArticlepeer-review

Abstract

In emerging RFID applications, the yoking proof provides a method not only to ensure the physical proximity of multiple objects but also to verify that a pair of RFID tags has been scanned simultaneously by a reader. Previous studies have focused on generating the yoking proof, but have not been successful in preserving the anonymity of tags. In this paper, we address two attacks on tracking RFID tags and propose a new yoking proof protocol to improve anonymity of the tags. For better practicality, we also present authenticated yoking proof generation against DoS attacks on the system. Our analysis shows that the proposed protocols achieves improved anonymity effectively. Specifically, the protocols require the least number of computational steps and modules in a tag, while preserving its anonymity.

Original languageEnglish
Pages (from-to)379-393
Number of pages15
JournalInternational Journal of Information Security
Volume17
Issue number4
DOIs
Publication statusPublished - 2018 Aug 1

Bibliographical note

Funding Information:
Acknowledgements This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(2015R1D1A1A0105 8928).

Publisher Copyright:
© 2017, Springer-Verlag GmbH Germany.

All Science Journal Classification (ASJC) codes

  • Software
  • Information Systems
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Improved yoking proof protocols for preserving anonymity'. Together they form a unique fingerprint.

Cite this