Improved yoking proof protocols for preserving anonymity
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ham, HyoungMin | - |
dc.contributor.author | Lee, JongHyup | - |
dc.contributor.author | Song, JooSeok | - |
dc.date.available | 2020-02-27T10:40:44Z | - |
dc.date.created | 2020-02-07 | - |
dc.date.issued | 2018-08 | - |
dc.identifier.issn | 1615-5262 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/3537 | - |
dc.description.abstract | In emerging RFID applications, the yoking proof provides a method not only to ensure the physical proximity of multiple objects but also to verify that a pair of RFID tags has been scanned simultaneously by a reader. Previous studies have focused on generating the yoking proof, but have not been successful in preserving the anonymity of tags. In this paper, we address two attacks on tracking RFID tags and propose a new yoking proof protocol to improve anonymity of the tags. For better practicality, we also present authenticated yoking proof generation against DoS attacks on the system. Our analysis shows that the proposed protocols achieves improved anonymity effectively. Specifically, the protocols require the least number of computational steps and modules in a tag, while preserving its anonymity. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | - |
dc.subject | RFID TAGS | - |
dc.title | Improved yoking proof protocols for preserving anonymity | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000438647600002 | - |
dc.identifier.doi | 10.1007/s10207-017-0383-z | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF INFORMATION SECURITY, v.17, no.4, pp.379 - 393 | - |
dc.identifier.scopusid | 2-s2.0-85021113207 | - |
dc.citation.endPage | 393 | - |
dc.citation.startPage | 379 | - |
dc.citation.title | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | - |
dc.citation.volume | 17 | - |
dc.citation.number | 4 | - |
dc.contributor.affiliatedAuthor | Lee, JongHyup | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | RFID | - |
dc.subject.keywordAuthor | Privacy | - |
dc.subject.keywordAuthor | Yoking proof | - |
dc.subject.keywordAuthor | Anonymity | - |
dc.subject.keywordPlus | RFID TAGS | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.