A high-security RFID grouping proof protocol

5Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Several categories of RFID authentication protocols have been proposed recently, among which Jules [5] introduced a novel research direction, named yoking proof. It is used to solve the problem that two tags have to be scanned simultaneously for some reasons. Afterwards, the yoking proof was developed into the grouping proof protocol and many such protocols have been presented. However there are some flaws on security or computational overhead. Based on the existing grouping proof protocols, a new method on key distribution is developed in this paper by means of distributing the points on straight lines to the entities. With this method, the performance of the grouping proof protocol will be improved. In comparison with the previous protocols, it provides security enhancement and performance improvement, which balances security and computational overhead to some extent.

Cite

CITATION STYLE

APA

Huang, P., & Mu, H. (2015). A high-security RFID grouping proof protocol. International Journal of Security and Its Applications, 9(1), 35–44. https://doi.org/10.14257/ijsia.2015.9.1.04

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free