Improved yoking proof protocols for preserving anonymity

Hyoungmin M. Ham, Jonghyup H. Lee, Jooseok S. Song

Research output: Contribution to journalArticle

Abstract

In emerging RFID applications, the yoking proof provides a method not only to ensure the physical proximity of multiple objects but also to verify that a pair of RFID tags has been scanned simultaneously by a reader. Previous studies have focused on generating the yoking proof, but have not been successful in preserving the anonymity of tags. In this paper, we address two attacks on tracking RFID tags and propose a new yoking proof protocol to improve anonymity of the tags. For better practicality, we also present authenticated yoking proof generation against DoS attacks on the system. Our analysis shows that the proposed protocols achieves improved anonymity effectively. Specifically, the protocols require the least number of computational steps and modules in a tag, while preserving its anonymity.

Original languageEnglish
Pages (from-to)379-393
Number of pages15
JournalInternational Journal of Information Security
Volume17
Issue number4
DOIs
Publication statusPublished - 2018 Aug 1

Fingerprint

Radio frequency identification (RFID)

All Science Journal Classification (ASJC) codes

  • Software
  • Information Systems
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Cite this

Ham, Hyoungmin M. ; Lee, Jonghyup H. ; Song, Jooseok S. / Improved yoking proof protocols for preserving anonymity. In: International Journal of Information Security. 2018 ; Vol. 17, No. 4. pp. 379-393.
@article{2cba47002ef24062802d4972a8fe7287,
title = "Improved yoking proof protocols for preserving anonymity",
abstract = "In emerging RFID applications, the yoking proof provides a method not only to ensure the physical proximity of multiple objects but also to verify that a pair of RFID tags has been scanned simultaneously by a reader. Previous studies have focused on generating the yoking proof, but have not been successful in preserving the anonymity of tags. In this paper, we address two attacks on tracking RFID tags and propose a new yoking proof protocol to improve anonymity of the tags. For better practicality, we also present authenticated yoking proof generation against DoS attacks on the system. Our analysis shows that the proposed protocols achieves improved anonymity effectively. Specifically, the protocols require the least number of computational steps and modules in a tag, while preserving its anonymity.",
author = "Ham, {Hyoungmin M.} and Lee, {Jonghyup H.} and Song, {Jooseok S.}",
year = "2018",
month = "8",
day = "1",
doi = "10.1007/s10207-017-0383-z",
language = "English",
volume = "17",
pages = "379--393",
journal = "International Journal of Information Security",
issn = "1615-5262",
publisher = "Springer Verlag",
number = "4",

}

Improved yoking proof protocols for preserving anonymity. / Ham, Hyoungmin M.; Lee, Jonghyup H.; Song, Jooseok S.

In: International Journal of Information Security, Vol. 17, No. 4, 01.08.2018, p. 379-393.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Improved yoking proof protocols for preserving anonymity

AU - Ham, Hyoungmin M.

AU - Lee, Jonghyup H.

AU - Song, Jooseok S.

PY - 2018/8/1

Y1 - 2018/8/1

N2 - In emerging RFID applications, the yoking proof provides a method not only to ensure the physical proximity of multiple objects but also to verify that a pair of RFID tags has been scanned simultaneously by a reader. Previous studies have focused on generating the yoking proof, but have not been successful in preserving the anonymity of tags. In this paper, we address two attacks on tracking RFID tags and propose a new yoking proof protocol to improve anonymity of the tags. For better practicality, we also present authenticated yoking proof generation against DoS attacks on the system. Our analysis shows that the proposed protocols achieves improved anonymity effectively. Specifically, the protocols require the least number of computational steps and modules in a tag, while preserving its anonymity.

AB - In emerging RFID applications, the yoking proof provides a method not only to ensure the physical proximity of multiple objects but also to verify that a pair of RFID tags has been scanned simultaneously by a reader. Previous studies have focused on generating the yoking proof, but have not been successful in preserving the anonymity of tags. In this paper, we address two attacks on tracking RFID tags and propose a new yoking proof protocol to improve anonymity of the tags. For better practicality, we also present authenticated yoking proof generation against DoS attacks on the system. Our analysis shows that the proposed protocols achieves improved anonymity effectively. Specifically, the protocols require the least number of computational steps and modules in a tag, while preserving its anonymity.

UR - http://www.scopus.com/inward/record.url?scp=85021113207&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85021113207&partnerID=8YFLogxK

U2 - 10.1007/s10207-017-0383-z

DO - 10.1007/s10207-017-0383-z

M3 - Article

AN - SCOPUS:85021113207

VL - 17

SP - 379

EP - 393

JO - International Journal of Information Security

JF - International Journal of Information Security

SN - 1615-5262

IS - 4

ER -