Get access

An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards

Authors

  • Chin-Ling Chen,

    Corresponding author
    1. Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung, Taiwan
    • Correspondence: Chin-Ling Chen, Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan.

      E-mail: chn1211@ms6.hinet.net

    Search for more papers by this author
  • Chun-Yi Wu

    1. Department of Computer Science and Engineering, National Chung-Hsing University, Taichung, Taiwan
    Search for more papers by this author

ABSTRACT

As radio-frequency identification (RFID) can quickly identify an object without requiring physical contact, it provides efficient identification for the verification of individual objects. There are currently numerous practical applications for RFID systems in various domains. For example, RFID mechanisms can be used to check whether large quantities of goods are present within a supply-chain system. Similarly, information about a product can be acquired in a supermarket without asking the clerks for help. The aforementioned applications are limited with regard to authentication between a single tag and a server, but other applications focus on authenticating the relationships among the tags. For example: a passenger carries a package while boarding an airplane. An airline agent has to check whether or not the package and the boarding card are correct and if the package corresponds to the boarding card. In this paper, we use a yoking-proof mechanism conforming to EPCglobal Class 1 Generation 2 standards to solve this double problem. In addition, the proposed scheme can provide a convenient, low-cost, and improved security mechanism for identifying the simultaneous presence of tags. Copyright © 2011 John Wiley & Sons, Ltd.

Ancillary