SpaCCS 2017: Security, Privacy, and Anonymity in Computation, Communication, and Storage pp 186-200 | Cite as
An ECC-Based Off-line Anonymous Grouping-Proof Protocol
Abstract
As more and more items tagged with RFID tags, the grouping-proof technology which is used to provide a coexistence evidence for a group of related items has become widely utilized. Due to the wireless channel used in RFID systems, security risk exists in the communication between the reader and tags. How to ensure the tag’s information security and generate reliable grouping-proof becomes a hot research topic. In this paper, an ECC-based off-line anonymous grouping-proof protocol (EAGP) is proposed. Different from the traditional methods which leave the verification process completely to background server, the EAGP authorizes the reader to verify the validity of group-proof without knowing the identity of tags. From the security analysis, the EAGP can protect the security and privacy of RFID tags, defense impersonations and replay attacks. Furthermore, it has the ability to prevent the system overhead caused by invalid submission of grouping-proofs from reader. As a result, the proposed EAGP equips practical application values.
Keywords
Privacy Security Grouping-proof Anonymous Elliptic curve cryptographNotes
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451 and 61402161, the High Level Talents Program of Higher Education in Guangdong Province under Grant Number 2016ZJ01, the Hunan Provincial Education Department of China under Grant Number 2015C0589, the Hunan Provincial Natural Science Foundation of China under Grant Number 2015JJ3046, the Fundamental Research Funds for the Central Universities of Central South University under Grant Number 2016zzts058.
References
- 1.Juels, A.: “ Yoking-Proofs” for RFID Tags. In: PerCom Workshops, pp. 138–143 (2004)Google Scholar
- 2.Peris-Lopez, P., Orfila, A., Mitrokotsa, A., Van der Lubbe, J.C.: A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1), 13–24 (2011)CrossRefGoogle Scholar
- 3.Chen, Y.-Y., Tsai, M.-L.: An RFID solution for enhancing inpatient medication safety with real-time verifiable grouping-proof. Int. J. Med. Inform. 83, 70–81 (2014)CrossRefGoogle Scholar
- 4.Chen, C.-L., Wu, C.-Y.: Using RFID yoking proof protocol to enhance inpatient medication safety. J. Med. Syst. 36, 2849–2864 (2012). Informatics, vol. 80, pp. 13–24 (2011)CrossRefGoogle Scholar
- 5.Zhou, Z., Liu, Q., Wang, G., Jia, W.: Secure medication scheme using the grouping-proof technology. J. Chin. Comput. Syst. 36, 2349–2353 (2015)Google Scholar
- 6.Peris-Lopez, P., Orfila, A., Hernandez-Castro, J.C., van der Lubbe, J.C.A.: Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Netw. Comput. Appl. 34, 833–845 (2011)CrossRefGoogle Scholar
- 7.Xie, K., Cao, J., Wang, X., et al.: Optimal resource allocation for reliable and energy efficient cooperative communications. IEEE Trans. Wirel. Commun. 12, 4994–5007 (2013)CrossRefGoogle Scholar
- 8.Sundaresan, S., Doss, R., Zhou, W.: Offline grouping proof protocol for RFID systems. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 247–252 (2013)Google Scholar
- 9.Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., Yang, L.: Grouping-proofs-based authentication protocol for distributed RFID systems. IEEE Trans. Parallel Distrib. Syst. 24(7), 1321–1330 (2013)CrossRefGoogle Scholar
- 10.Chien, H.-Y., Liu, S.-B.: Tree-based RFID yoking proof. In: 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009, pp. 550–553 (2009)Google Scholar
- 11.Lien, Y., Leng, X., Mayes, K., Chiu, J.-H.: Reading order independent grouping proof for RFID tags. In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, pp. 128–136 (2008)Google Scholar
- 12.Piramuthu, S.: On existence proofs for multiple RFID tags. In: ACS/IEEE International Conference on Pervasive Services, pp. 317–320 (2006)Google Scholar
- 13.Li, N., Mu, Y., Susilo, W., Varadharajan, V.: Anonymous yoking-group proofs. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 615–620 (2015)Google Scholar
- 14.Ma, C., Lin, J., Wang, Y., Shang, M.: Offline RFID grouping proofs with trusted timestamps. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 674–681 (2012)Google Scholar
- 15.Cho, J.S., Yeo, S.S., Hwang, S., Rhee, S.Y., Kim, S.K.: Enhanced yoking proof protocols for RFID tags and tag groups. In: 22nd International Conference on Advanced Information Networking and Applications - Workshops, AINAW 2008, pp. 1591–1596 (2008)Google Scholar
- 16.Hong-yan, K.: Analysis and improvement of ECC-based grouping-proof protocol for RFID. Int. J. Control Autom. 9, 343–352 (2016)CrossRefGoogle Scholar
- 17.Lo, N.-W., Yeh, K.-H.: Anonymous coexistence proofs for RFID tags. J. Inf. Sci. Eng. 26, 1213–1230 (2010)Google Scholar
- 18.Burmester, M., De Medeiros, B., Motta, R.: Provably secure grouping-proofs for RFID tags. In: International Conference on Smart Card Research and Advanced Applications, pp. 176–190 (2008)Google Scholar
- 19.Burmester, M., Munilla, J.: An anonymous RFID grouping-proof with missing tag identification. In: 10th IEEE International Conference on Radio-Frequency Identification, pp. 3–5 (2016)Google Scholar
- 20.Wolkerstorfer, J.: Is elliptic-curve cryptography suitable to secure RFID tags. In: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto (2005)Google Scholar
- 21.Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: An elliptic curve processor suitable For RFID-tags. IACR Cryptology ePrint Archive, vol. 2006 p. 227 (2006)Google Scholar
- 22.Batina, L., Lee, Y.K., Seys, S., Singele, D., Verbauwhede, I.: Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Pers. Ubiquit. Comput. 16, 323–335 (2012)CrossRefGoogle Scholar
- 23.Li, H., Lv, C., Ma, J., et al.: Security analysis of a privacy-preserving ECC-based grouping-proof protocol. J. Convergence Inf. Technol. 6, 113–119 (2011)CrossRefGoogle Scholar
- 24.Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. IEEE Computer Society (2001)Google Scholar
- 25.Lin, Q., Zhang, F.: ECC-based grouping-proof RFID for inpatient medication safety. J. Med. Syst. 36, 3527–3531 (2012)CrossRefGoogle Scholar
- 26.Menezes, A.: Evaluation of security level of cryptography: the Elliptic Curve Discrete Logarithm Problem (ECDLP). University of Waterloo (2001)Google Scholar