Ad hoc subgroup proofs for RFID
نویسندگان
چکیده
In many RFID applications it is necessary to be able to identify the presence of (all) the tags of a predefined group, e.g., to establish that all components of a kit are present. If the interrogation is offline, by RFID readers that do not share any secret keys with the tags, then a record of simultaneous presence, or a grouping proof, has to be generated by the tags themselves. This type of proof is typically obtained by assigning to each tag in the group a unique group identifier. In certain situations, however, the entire group may not be present, and it may be sufficient that a (an ad hoc) subgroup proof is generated. In this paper we consider ad hoc subgroup proofs. We first describe a generic ad hoc subgroup proof by extending a previously proposed grouping proof to an ad hoc setting. We then propose a novel ad hoc subgroup proof for RFID that supports privacy (unlinkability).
منابع مشابه
Probabilistic yoking proofs for large scale IoT systems
Yoking (or grouping) proofs were introduced in 2004 as a security construction for RFID applications in which it is needed to build an evidence that several objects have been scanned simultaneously or, at least, within a short time. Such protocols were designed for scenarios where only a few tags (typically just two) are involved, so issues such as preventing an object from abandoning the proof...
متن کاملSurvey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or mobile ad hoc networks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight cryptographic primitives for many security applications beca...
متن کاملA Review of Various Cross-Layer Frameworks for Ad Hoc Network
In this paper, it has been discussed and focused over the various frameworks on ad hoc networks. Since, it is not easy to follow all the aspects and issues over ad hoc networks followed by cross layer designing approaches. This paper discussed various frameworks supported by real-time multimedia, multi objective performance, multi-path transmission for Voice over Internet Protocol (VoIP) commun...
متن کاملInstant collision resolution for tag identification in RFID networks
In this paper, we approach the problem of identifying a set of objects in an RFID network. We propose a modified version of Slotted Aloha protocol to reduce the number of transmission collisions. All tags select a slot to transmit their ID by generating a random number. If there is a collision in a slot, the reader broadcasts the next identification request only to tags which collided in that s...
متن کاملTag-based cooperative data gathering and energy recharging in wide area RFID sensor networks
The Wireless Identification and Sensing Platform (WISP) conjugates the identification potential of the RFID technology and the sensing and computing capability of the wireless sensors. Practical issues, such as the need of periodically recharging WISPs, challenge the effective deployment of large-scale RFID sensor networks (RSNs) consisting of RFID readers and WISP nodes. In this view, the pape...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011