An ECC-Based Off-line Anonymous Grouping-Proof Protocol

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10656)

Abstract

As more and more items tagged with RFID tags, the grouping-proof technology which is used to provide a coexistence evidence for a group of related items has become widely utilized. Due to the wireless channel used in RFID systems, security risk exists in the communication between the reader and tags. How to ensure the tag’s information security and generate reliable grouping-proof becomes a hot research topic. In this paper, an ECC-based off-line anonymous grouping-proof protocol (EAGP) is proposed. Different from the traditional methods which leave the verification process completely to background server, the EAGP authorizes the reader to verify the validity of group-proof without knowing the identity of tags. From the security analysis, the EAGP can protect the security and privacy of RFID tags, defense impersonations and replay attacks. Furthermore, it has the ability to prevent the system overhead caused by invalid submission of grouping-proofs from reader. As a result, the proposed EAGP equips practical application values.

Keywords

Privacy Security Grouping-proof Anonymous Elliptic curve cryptograph 

Notes

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451 and 61402161, the High Level Talents Program of Higher Education in Guangdong Province under Grant Number 2016ZJ01, the Hunan Provincial Education Department of China under Grant Number 2015C0589, the Hunan Provincial Natural Science Foundation of China under Grant Number 2015JJ3046, the Fundamental Research Funds for the Central Universities of Central South University under Grant Number 2016zzts058.

References

  1. 1.
    Juels, A.: “ Yoking-Proofs” for RFID Tags. In: PerCom Workshops, pp. 138–143 (2004)Google Scholar
  2. 2.
    Peris-Lopez, P., Orfila, A., Mitrokotsa, A., Van der Lubbe, J.C.: A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1), 13–24 (2011)CrossRefGoogle Scholar
  3. 3.
    Chen, Y.-Y., Tsai, M.-L.: An RFID solution for enhancing inpatient medication safety with real-time verifiable grouping-proof. Int. J. Med. Inform. 83, 70–81 (2014)CrossRefGoogle Scholar
  4. 4.
    Chen, C.-L., Wu, C.-Y.: Using RFID yoking proof protocol to enhance inpatient medication safety. J. Med. Syst. 36, 2849–2864 (2012). Informatics, vol. 80, pp. 13–24 (2011)CrossRefGoogle Scholar
  5. 5.
    Zhou, Z., Liu, Q., Wang, G., Jia, W.: Secure medication scheme using the grouping-proof technology. J. Chin. Comput. Syst. 36, 2349–2353 (2015)Google Scholar
  6. 6.
    Peris-Lopez, P., Orfila, A., Hernandez-Castro, J.C., van der Lubbe, J.C.A.: Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Netw. Comput. Appl. 34, 833–845 (2011)CrossRefGoogle Scholar
  7. 7.
    Xie, K., Cao, J., Wang, X., et al.: Optimal resource allocation for reliable and energy efficient cooperative communications. IEEE Trans. Wirel. Commun. 12, 4994–5007 (2013)CrossRefGoogle Scholar
  8. 8.
    Sundaresan, S., Doss, R., Zhou, W.: Offline grouping proof protocol for RFID systems. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 247–252 (2013)Google Scholar
  9. 9.
    Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., Yang, L.: Grouping-proofs-based authentication protocol for distributed RFID systems. IEEE Trans. Parallel Distrib. Syst. 24(7), 1321–1330 (2013)CrossRefGoogle Scholar
  10. 10.
    Chien, H.-Y., Liu, S.-B.: Tree-based RFID yoking proof. In: 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009, pp. 550–553 (2009)Google Scholar
  11. 11.
    Lien, Y., Leng, X., Mayes, K., Chiu, J.-H.: Reading order independent grouping proof for RFID tags. In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, pp. 128–136 (2008)Google Scholar
  12. 12.
    Piramuthu, S.: On existence proofs for multiple RFID tags. In: ACS/IEEE International Conference on Pervasive Services, pp. 317–320 (2006)Google Scholar
  13. 13.
    Li, N., Mu, Y., Susilo, W., Varadharajan, V.: Anonymous yoking-group proofs. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 615–620 (2015)Google Scholar
  14. 14.
    Ma, C., Lin, J., Wang, Y., Shang, M.: Offline RFID grouping proofs with trusted timestamps. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 674–681 (2012)Google Scholar
  15. 15.
    Cho, J.S., Yeo, S.S., Hwang, S., Rhee, S.Y., Kim, S.K.: Enhanced yoking proof protocols for RFID tags and tag groups. In: 22nd International Conference on Advanced Information Networking and Applications - Workshops, AINAW 2008, pp. 1591–1596 (2008)Google Scholar
  16. 16.
    Hong-yan, K.: Analysis and improvement of ECC-based grouping-proof protocol for RFID. Int. J. Control Autom. 9, 343–352 (2016)CrossRefGoogle Scholar
  17. 17.
    Lo, N.-W., Yeh, K.-H.: Anonymous coexistence proofs for RFID tags. J. Inf. Sci. Eng. 26, 1213–1230 (2010)Google Scholar
  18. 18.
    Burmester, M., De Medeiros, B., Motta, R.: Provably secure grouping-proofs for RFID tags. In: International Conference on Smart Card Research and Advanced Applications, pp. 176–190 (2008)Google Scholar
  19. 19.
    Burmester, M., Munilla, J.: An anonymous RFID grouping-proof with missing tag identification. In: 10th IEEE International Conference on Radio-Frequency Identification, pp. 3–5 (2016)Google Scholar
  20. 20.
    Wolkerstorfer, J.: Is elliptic-curve cryptography suitable to secure RFID tags. In: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto (2005)Google Scholar
  21. 21.
    Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: An elliptic curve processor suitable For RFID-tags. IACR Cryptology ePrint Archive, vol. 2006 p. 227 (2006)Google Scholar
  22. 22.
    Batina, L., Lee, Y.K., Seys, S., Singele, D., Verbauwhede, I.: Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Pers. Ubiquit. Comput. 16, 323–335 (2012)CrossRefGoogle Scholar
  23. 23.
    Li, H., Lv, C., Ma, J., et al.: Security analysis of a privacy-preserving ECC-based grouping-proof protocol. J. Convergence Inf. Technol. 6, 113–119 (2011)CrossRefGoogle Scholar
  24. 24.
    Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. IEEE Computer Society (2001)Google Scholar
  25. 25.
    Lin, Q., Zhang, F.: ECC-based grouping-proof RFID for inpatient medication safety. J. Med. Syst. 36, 3527–3531 (2012)CrossRefGoogle Scholar
  26. 26.
    Menezes, A.: Evaluation of security level of cryptography: the Elliptic Curve Discrete Logarithm Problem (ECDLP). University of Waterloo (2001)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of Information Science and EngineeringCentral South UniversityChangshaChina
  2. 2.College of Physics and Information ScienceHunan Normal UniversityChangshaChina
  3. 3.School of Computer Science and Electronic EngineeringHunan UniversityChangshaChina
  4. 4.School of Computer Science and Educational SoftwareGuangzhou UniversityGuangzhouChina

Personalised recommendations