CINXE.COM

TY - JFULL AU - HyoungMin Ham and JooSeok Song PY - 2009/1/ TI - Privacy Threats in RFID Group Proof Schemes T2 - International Journal of Computer and Information Engineering SP - 2830 EP - 2836 VL - 3 SN - 1307-6892 UR - https://publications.waset.org/pdf/8739 PU - World Academy of Science, Engineering and Technology NX - Open Science Index 36, 2009 N2 - RFID tag is a small and inexpensive microchip which is capable of transmitting unique identifier through wireless network in a short distance. If a group of RFID tags can be scanned simultaneously by one reader, RFID Group proof could be generated. Group proof can be used in various applications, such as good management which is usually achieved using barcode system. A lot of RFID group proof schemes have been proposed by many researchers. In this paper, we introduce some existing group proof schemes and then analyze their vulnerabilities to the privacy. Moreover, we propose a new attack model, which threats the privacy of user by tracking tags in a group. ER -