Skip to main content
Top

2016 | OriginalPaper | Chapter

Resilient Grouping Proofs with Missing Tag Identification

Authors : Mike Burmester, Jorge Munilla

Published in: Ubiquitous Computing and Ambient Intelligence

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The adoption of RFID (Radio Frequency Identification) technology has greatly improved the efficiency of inventory control, supply-chain management and logistics. With RFID group scanning, an RFID reader scans a group of RFID tagged objects to generate a grouping proof of “simultaneous” presence. Shipments may have to be tracked remotely by readers that are not necessarily trusted. In this paper we extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers. We present a two-pass anonymous grouping proof (of integrity) for the scanned objects of a (not necessarily complete) collection of RFID tagged objects that identifies missing objects. The proof is generated by an untrusted reader and can be checked by a verifier, a trusted entity. We only assume that RFID tags are able to generate pseudorandom numbers and compute one-way hash functions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference EPC-Global: Radio-Frequency Identity Protocols, Generation-2.V2. UHF RFID. Technical report, April 2015 EPC-Global: Radio-Frequency Identity Protocols, Generation-2.V2. UHF RFID. Technical report, April 2015
2.
go back to reference Kapoor, G., Piramuthu, S.: Single RFID tag ownership transfer protocols. IEEE Trans. Syst. Man Cybern. Part C 42(2), 164–173 (2012)CrossRef Kapoor, G., Piramuthu, S.: Single RFID tag ownership transfer protocols. IEEE Trans. Syst. Man Cybern. Part C 42(2), 164–173 (2012)CrossRef
3.
go back to reference Jorge Munilla, F.G., Susilo, W.: Cryptanalysis of an EPCC1G2 standard compliant ownership transfer protocol. Wirel. Pers. Commun. 72, 245–258 (2013)CrossRef Jorge Munilla, F.G., Susilo, W.: Cryptanalysis of an EPCC1G2 standard compliant ownership transfer protocol. Wirel. Pers. Commun. 72, 245–258 (2013)CrossRef
4.
go back to reference Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., Yang, L.T.: Grouping-proofs-based authentication protocol for distributed RFID systems. IEEE Trans. Parallel Distrib. Syst. 24(7), 1321–1330 (2013)CrossRef Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., Yang, L.T.: Grouping-proofs-based authentication protocol for distributed RFID systems. IEEE Trans. Parallel Distrib. Syst. 24(7), 1321–1330 (2013)CrossRef
5.
go back to reference Burmester, M., Munilla, J.: RFID grouping-proofs. In: Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID. IGI Global (2013) Burmester, M., Munilla, J.: RFID grouping-proofs. In: Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID. IGI Global (2013)
7.
go back to reference Juels, A.: Yoking-proofs for RFID tags. In: PERCOMW 2004: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Washington, DC, pp. 138–142. IEEE Computer Society, USA (2004) Juels, A.: Yoking-proofs for RFID tags. In: PERCOMW 2004: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Washington, DC, pp. 138–142. IEEE Computer Society, USA (2004)
8.
go back to reference Piramuthu, S.: On existence proofs for multiple RFID tags. In: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006, June 2006. IEEE Computer Society Press, IEEE, Lyon, France (2006) Piramuthu, S.: On existence proofs for multiple RFID tags. In: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006, June 2006. IEEE Computer Society Press, IEEE, Lyon, France (2006)
9.
go back to reference Huang, H.-H., Ku, C.-Y.: A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33, 467 (2008)CrossRef Huang, H.-H., Ku, C.-Y.: A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33, 467 (2008)CrossRef
10.
go back to reference Chien, H.-Y., Yang, C.-C., Wu, T.-C., Lee, C.-F.: Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3), 369–375 (2011)CrossRef Chien, H.-Y., Yang, C.-C., Wu, T.-C., Lee, C.-F.: Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3), 369–375 (2011)CrossRef
11.
go back to reference Burmester, M., Munilla, J.: Distributed group authentication for RFID supply management. IACR Cryptol. ePrint Arch. 2013, 779 (2013) Burmester, M., Munilla, J.: Distributed group authentication for RFID supply management. IACR Cryptol. ePrint Arch. 2013, 779 (2013)
12.
go back to reference Sato, Y., Igarashi, Y., Mitsugi, J., Nakamura, O., Murai, J.: Identification of missing objects with group coding of RF tags. In: 2012 IEEE International Conference on RFID, pp. 95–101, April 2012 Sato, Y., Igarashi, Y., Mitsugi, J., Nakamura, O., Murai, J.: Identification of missing objects with group coding of RF tags. In: 2012 IEEE International Conference on RFID, pp. 95–101, April 2012
14.
go back to reference Su, Y.-S., Lin, J.-R., Tonguz, O.K.: Grouping of RFID tags via strongly selective families. IEEE Commun. Lett. 17(6), 1120–1123 (2013)CrossRef Su, Y.-S., Lin, J.-R., Tonguz, O.K.: Grouping of RFID tags via strongly selective families. IEEE Commun. Lett. 17(6), 1120–1123 (2013)CrossRef
15.
go back to reference Su, Y.-S., Tonguz, O.K.: Using the Chinese remainder theorem for the grouping of RFID tags. IEEE Trans. Commun. 61(11), 4741–4753 (2013)CrossRef Su, Y.-S., Tonguz, O.K.: Using the Chinese remainder theorem for the grouping of RFID tags. IEEE Trans. Commun. 61(11), 4741–4753 (2013)CrossRef
16.
go back to reference Su, Y.-S.: Extended grouping of RFID tags based on resolvable transversal designs. IEEE Signal Process. Lett. 21(4), 488–492 (2014)CrossRef Su, Y.-S.: Extended grouping of RFID tags based on resolvable transversal designs. IEEE Signal Process. Lett. 21(4), 488–492 (2014)CrossRef
17.
go back to reference Ben Mabrouk, N., Couderc, P.: EraRFID: reliable RFID systems using erasure coding. In: 2015 IEEE International Conference on RFID, pp. 121–128, April 2015 Ben Mabrouk, N., Couderc, P.: EraRFID: reliable RFID systems using erasure coding. In: 2015 IEEE International Conference on RFID, pp. 121–128, April 2015
18.
go back to reference Burmester, M., Munilla, J.: Tag memory-erasure tradeoff of RFID grouping codes. IEEE Commun. Lett. 99, 1–4 (2016) Burmester, M., Munilla, J.: Tag memory-erasure tradeoff of RFID grouping codes. IEEE Commun. Lett. 99, 1–4 (2016)
19.
go back to reference Burmester, M., Munilla, J.: An anonymous RFID grouping-proof with missing tag identification. In: 10th Annual IEEE International Conference on RFID (IEEE RFID 2016), Orlando, Florida, 3–5 May 2016, pp. 1–8. IEEE (2016) Burmester, M., Munilla, J.: An anonymous RFID grouping-proof with missing tag identification. In: 10th Annual IEEE International Conference on RFID (IEEE RFID 2016), Orlando, Florida, 3–5 May 2016, pp. 1–8. IEEE (2016)
20.
21.
go back to reference Roca, V., Cunche, M., Lacan, J., Bouabdallah, A., Matsuzono, K.: Simple reed-solomon forward error correction (FEC) scheme for FECFRAME. Technical report (2013) Roca, V., Cunche, M., Lacan, J., Bouabdallah, A., Matsuzono, K.: Simple reed-solomon forward error correction (FEC) scheme for FECFRAME. Technical report (2013)
22.
go back to reference Bengio, S., Brassard, G., Desmedt, Y., Goutier, C., Quisquater, J.-J.: Secure implementations of identification systems. J. Cryptol. 4(3), 175–183 (1991)CrossRef Bengio, S., Brassard, G., Desmedt, Y., Goutier, C., Quisquater, J.-J.: Secure implementations of identification systems. J. Cryptol. 4(3), 175–183 (1991)CrossRef
23.
go back to reference Mangard, S., Popp, T., Oswald, M.E.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, USA (2007). ISBN: 0-387-30857-1MATH Mangard, S., Popp, T., Oswald, M.E.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, USA (2007). ISBN: 0-387-30857-1MATH
24.
go back to reference Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The swiss-knife RFID distance bounding protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98–115. Springer, Heidelberg (2009)CrossRef Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The swiss-knife RFID distance bounding protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98–115. Springer, Heidelberg (2009)CrossRef
25.
go back to reference Munilla, J., Ortiz, A., Peinado, A.: Distance bounding protocols with void-challenges for RFID. In: Workshop on RFID Security - RFIDSec 2006, Graz, Austria, July 2006 Munilla, J., Ortiz, A., Peinado, A.: Distance bounding protocols with void-challenges for RFID. In: Workshop on RFID Security - RFIDSec 2006, Graz, Austria, July 2006
26.
go back to reference Duc, D.N., Kim, K.: On the security of RFID group scanning protocols. IEICE Trans. 93–D(3), 528–530 (2010) Duc, D.N., Kim, K.: On the security of RFID group scanning protocols. IEICE Trans. 93–D(3), 528–530 (2010)
Metadata
Title
Resilient Grouping Proofs with Missing Tag Identification
Authors
Mike Burmester
Jorge Munilla
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-48799-1_59

Premium Partner