Authentication Protocols for an Object with Dynamic RFID Tags
A majority of existing RFID authentication protocols consider tagged items that are independent of other tagged items. However, as RFID tags permeate to item-level granularity where several items comprise an object of interest there is a need to develop protocols that seamlessly accommodate inclusion and exclusion of tags on such an object. We propose protocols for this scenario.
I thank Ton van Deursen for discussions/feedback during the writing of this paper. All error(s) remain my own.
- 1.Bustillo, M.: Wal-Mart radio tags to track clothing. Wall Street J. Bus. Technol. Sect. (2010)Google Scholar
- 2.Juels, A.: Yoking-Proofs for RFID tags. In: Proceedings of the First International Workshop on Pervasive Computing and Communication Security, pp. 138–143. IEEE Press (2004)Google Scholar