A New Lightweight RFID Grouping Proof Protocol
Radio Frequency Identification (RFID) is a key technology for the Internet of things. With the spread of RFID system, the security and privacy related to RFID plays a vital role in applications. At present, EPC C1G2 tags have been widely spread in the commodity retail, pharmaceutical sector, medicine distribution and many other fields. This kind of tags is passive, which means that they have limited power and memory space. Under these conditions, we present a new lightweight protocol for the RFID system with two tags and one reader. In the protocol, we develop a new function to realize the exchange between bits of a vector, which uses fewer resources in computing. In addition pieces of analysis show that the protocol reaches the capabilities of the grouping proofs and is resistant to a variety of attacks.
KeywordsRFID Lightweight Grouping proof protocol Privacy Security
This work is supported by National Natural Science Foundation of China under Grant 61201159 and Fundamental Research Funds for the Central Universities under Grant 2012JBM016. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.
- 2.Sarma SE, Weis SA, Engels DW (2003) RFID systems and privacy implications. In: Kaliski BS, Koc CK, Paar C (eds) Proceedings of the 4th international workshop on cryptographic hardware and embedded systems (CHES 2002). Lectures notes in computer science 2523. Springer, Berlin, pp 454–469Google Scholar
- 3.Sarma SE, Weis SA, Engels DW (2003) Radio-frequency identification: Secure risks and challenges. RSA Lab Cryptobytes 6(1):2–9Google Scholar
- 4.Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter D, Muller G, Stephan W, Ullmann M (eds) Proceedings of the 1st international conference on security in pervasive computing. Lectures notes in computer science 2802, Springer, Berlin, pp 201–212Google Scholar
- 5.Ohkubo M, Suzuki K, Kinoshita S (2004) Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 symposium on crytography and information security (SCIS 2004), Sendai, pp 719–724Google Scholar
- 6.Henrici D, Muller P (2004) Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE annual conference on pervasive computing and communications workshops (PERCOMW’04), Washington, DC, USA, pp 149–153Google Scholar
- 7.Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705Google Scholar
- 8.Fan K, Li J, Li H, Liang X, Shen XS, Yang Y (2012) ESLRAS: a lightweight RFID authentication scheme with high efficiency and strong security for internet of things. In: Proceedings of 4th international conference on intelligent networking and collaborative systems, pp 323–328Google Scholar
- 10.Blass E-O, Elkhiyaoui K, Molva R (2012) PPS: Privacy-preserving statistics using RFID tags, world of wireless. In: Proceedings of 2012 IEEE international symposium mobile and multimedia networks (WoWMoM), pp 1–6Google Scholar
- 11.Di Pietro R, Molva R (2007) Information confinement, privacy, and security in RFID systems. In: Proceedings of the 12th European symposium on research in computer security, pp 187–202Google Scholar
- 12.Juels A (2004) Yoking proofs” for RFID tags. In: Proceedings of the first international workshop on pervasive computing and communication security, IEEE PressGoogle Scholar
- 13.Saito J, Sakurai K (2005) Grouping proof for RFID tags. In: Proceedings of the 19th international conference on advanced information networking and applications (AINA’05), pp 621–624Google Scholar