Anonymous Coexistence Proofs for RFID Tags

نویسندگان

  • Nai-Wei Lo
  • Kuo-Hui Yeh
چکیده

In a world with RFID carriers everywhere, the coexistence proof of multiple RFID-tagged objects shown at the same time and the same place can become a very useful mechanism and be adopted in many application areas such as computer forensics, evi-dences in law, valuables security, and warning or notification systems, etc. In order to support the correctness of derived proofs, it is necessary to design secure and robust coexistence proofs protocols based on RFID characteristics. In this paper we address the security and privacy requirements for a secure coexistence proofs protocol on RFID tags to defend against tag privacy divulgence, forward secrecy disclosure, denial-of-proof (DoP) attack, and authentication sequence disorder. Along with these design criterions, a recent published secure proofs protocol [11] is evaluated to identify the demand area for security enhancement. To overcome found security weaknesses, tag privacy divulgence and the new known DoP attack in previous proofs schemes, we introduce three anonymous coexistence proofs protocols. According to our security and performance analyses, the proposed protocols possess all required security properties with the same complexity order of the clumping-proofs protocol on computation cost.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Anonymous Offline RFID Grouping-Proof Protocol

As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security risk exists in the communication between the reader and tags. How to ensure the tag’s information security and to generate reliable grouping-pro...

متن کامل

Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags

How can a RFID (Radio Frequency Identification Devices) system prove that two or more RFID tags are in the same location? Previous researchers have proposed yoking-proof and grouping-proof techniques to address this problem – and when these turned out to be vulnerable to replay attacks, a new existence-proof technique was proposed. We critique this class of existence-proofs and show it has thre...

متن کامل

A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme

To minimize cargo theft during transport, mobile radio frequency identification (RFID) grouping proof methods are generally employed to ensure the integrity of entire cargo loads. However, conventional grouping proofs cannot simultaneously generate grouping proofs for a specific group of RFID tags. The most serious problem of these methods is that nonexistent tags are included in the grouping p...

متن کامل

Privacy-Preserving ECC-Based Grouping Proofs for RFID

The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags are potentially untrusted. In this paper, we extend this concept and propose a narrowstrong privacy-preserving RFID grouping proof and demonstrate that it can easily be extended to use cases with more than two tags, ...

متن کامل

An Enhanced Grouping Proof for Multiple RFID Readers and Tag Groups

RFID authentication on large numbers of tags or tag groups has attracted many researchers’ attention as an extension of initial one-or-two-tags scenarios. Due to demands of RFID application in supply chain, various proofs are proposed in the purpose of solving existing problems of grouping tags identification. However, it is proved that verifiers in these proofs are not aware of abnormal relati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2010