Advertisement

A New Lightweight RFID Grouping Proof Protocol

  • Ping Huang
  • Haibing Mu
  • Changlun Zhang
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 260)

Abstract

Radio Frequency Identification (RFID) is a key technology for the Internet of things. With the spread of RFID system, the security and privacy related to RFID plays a vital role in applications. At present, EPC C1G2 tags have been widely spread in the commodity retail, pharmaceutical sector, medicine distribution and many other fields. This kind of tags is passive, which means that they have limited power and memory space. Under these conditions, we present a new lightweight protocol for the RFID system with two tags and one reader. In the protocol, we develop a new function to realize the exchange between bits of a vector, which uses fewer resources in computing. In addition pieces of analysis show that the protocol reaches the capabilities of the grouping proofs and is resistant to a variety of attacks.

Keywords

RFID Lightweight Grouping proof protocol Privacy Security 

Notes

Acknowledgments

This work is supported by National Natural Science Foundation of China under Grant 61201159 and Fundamental Research Funds for the Central Universities under Grant 2012JBM016. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

References

  1. 1.
    Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394MathSciNetCrossRefGoogle Scholar
  2. 2.
    Sarma SE, Weis SA, Engels DW (2003) RFID systems and privacy implications. In: Kaliski BS, Koc CK, Paar C (eds) Proceedings of the 4th international workshop on cryptographic hardware and embedded systems (CHES 2002). Lectures notes in computer science 2523. Springer, Berlin, pp 454–469Google Scholar
  3. 3.
    Sarma SE, Weis SA, Engels DW (2003) Radio-frequency identification: Secure risks and challenges. RSA Lab Cryptobytes 6(1):2–9Google Scholar
  4. 4.
    Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter D, Muller G, Stephan W, Ullmann M (eds) Proceedings of the 1st international conference on security in pervasive computing. Lectures notes in computer science 2802, Springer, Berlin, pp 201–212Google Scholar
  5. 5.
    Ohkubo M, Suzuki K, Kinoshita S (2004) Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 symposium on crytography and information security (SCIS 2004), Sendai, pp 719–724Google Scholar
  6. 6.
    Henrici D, Muller P (2004) Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE annual conference on pervasive computing and communications workshops (PERCOMW’04), Washington, DC, USA, pp 149–153Google Scholar
  7. 7.
    Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705Google Scholar
  8. 8.
    Fan K, Li J, Li H, Liang X, Shen XS, Yang Y (2012) ESLRAS: a lightweight RFID authentication scheme with high efficiency and strong security for internet of things. In: Proceedings of 4th international conference on intelligent networking and collaborative systems, pp 323–328Google Scholar
  9. 9.
    Blass E-O, Kurmus A, Molva R, Noubir G, Shikfa A (2011) The Ff-family of protocols for RFID-privacy and authentication. IEEE Trans Dependable Secure Comput 8(3):466–480CrossRefGoogle Scholar
  10. 10.
    Blass E-O, Elkhiyaoui K, Molva R (2012) PPS: Privacy-preserving statistics using RFID tags, world of wireless. In: Proceedings of 2012 IEEE international symposium mobile and multimedia networks (WoWMoM), pp 1–6Google Scholar
  11. 11.
    Di Pietro R, Molva R (2007) Information confinement, privacy, and security in RFID systems. In: Proceedings of the 12th European symposium on research in computer security, pp 187–202Google Scholar
  12. 12.
    Juels A (2004) Yoking proofs” for RFID tags. In: Proceedings of the first international workshop on pervasive computing and communication security, IEEE PressGoogle Scholar
  13. 13.
    Saito J, Sakurai K (2005) Grouping proof for RFID tags. In: Proceedings of the 19th international conference on advanced information networking and applications (AINA’05), pp 621–624Google Scholar
  14. 14.
    Peris-Lopez P, Orfila A, Hernandez-Castro JC, Van der Lubbe JC (2011) Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J Netw Comput Appl 34(3):833–845CrossRefGoogle Scholar
  15. 15.
    Piramuthu S (2007) Protocols for RFID tag/reader authentication. Decis Support Syst 43:897–914CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.Beijing Key Laboratory of Communication and Information Systems, School of Electronic and Information EngineeringBeijing Jiaotong UniversityBeijingChina
  2. 2.Science SchoolBeijing University of Civil Engineering and ArchitectureBeijingChina

Personalised recommendations