Skip to main content
Erschienen in: Information Systems Frontiers 5/2019

19.02.2018

A Novel Group Ownership Delegate Protocol for RFID Systems

verfasst von: Cheng-Chi Lee, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai, Athanasios V. Vasilakos

Erschienen in: Information Systems Frontiers | Ausgabe 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, Radio Frequency Identification (RFID) applications of various kinds have been blooming. However, along with the stunning advancement have come all sorts of security and privacy issues, for RFID tags oftentimes store private data and so the permission to read a tag or any other kind of access needs to be carefully controlled. Therefore, of all the RFID-related researches released so far, a big portion focuses on the issue of authentication. There have been so many cases where the legal access to or control over a tag needs to be switched from one reader to another, which has encouraged the development of quite a number of different kinds of ownership transfer protocols. On the other hand, not only has the need for ownership transfer been increasing, but a part of it has also been evolving from individual ownership transfer into group ownership transfer. However, in spite of the growing need for practical group ownership transfer services, little research has been done to offer an answer to the need. In this paper, we shall present a new RFID time-bound group ownership delegate protocol based on homomorphic encryption and quadratic residues. In addition, in order to provide more comprehensive service, on top of mutual authentication and ownership delegation, we also offer options for the e-th time verification as well as the revocation of earlier delegation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Alamr, A. A., Kausar, F., Kim, J., & Seo, C. (2016). A secure ECC-based RFID mutual authentication protocol for internet of things. The Journal of Supercomputing, 1–14. Alamr, A. A., Kausar, F., Kim, J., & Seo, C. (2016). A secure ECC-based RFID mutual authentication protocol for internet of things. The Journal of Supercomputing, 1–14.
Zurück zum Zitat Azimi, Y., & Bagherzadeh, J. (2015). Improvement of quadratic residues based scheme for authentication and privacy in mobile RFID. In Proceedings of 2015 7th Conference on Information and Knowledge Technology (IKT), Urmia, Iran, pp. 1–6. Azimi, Y., & Bagherzadeh, J. (2015). Improvement of quadratic residues based scheme for authentication and privacy in mobile RFID. In Proceedings of 2015 7th Conference on Information and Knowledge Technology (IKT), Urmia, Iran, pp. 1–6.
Zurück zum Zitat Bagheri, N., Safkhani, M., & Jannati, H. (2015). Security analysis of Niu et al. authentication and ownership management protocol. IACR Cryptology ePrint Archive, pp. 1-8. Bagheri, N., Safkhani, M., & Jannati, H. (2015). Security analysis of Niu et al. authentication and ownership management protocol. IACR Cryptology ePrint Archive, pp. 1-8.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. M. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8, 18–36.CrossRef Burrows, M., Abadi, M., & Needham, R. M. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8, 18–36.CrossRef
Zurück zum Zitat Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L. J., & Zhao, Q. (2016). RFID ownership transfer protocol based on cloud. Computer Networks, 105, 47–59.CrossRef Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L. J., & Zhao, Q. (2016). RFID ownership transfer protocol based on cloud. Computer Networks, 105, 47–59.CrossRef
Zurück zum Zitat Chen, C.-L., & Chien, C.-F. (2013). An ownership transfer scheme using mobile RFIDs. Wireless Personal Communications, 68, 1093–1119.CrossRef Chen, C.-L., & Chien, C.-F. (2013). An ownership transfer scheme using mobile RFIDs. Wireless Personal Communications, 68, 1093–1119.CrossRef
Zurück zum Zitat Chen, Y., & Chou, J.-S. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15, 97–120.CrossRef Chen, Y., & Chou, J.-S. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15, 97–120.CrossRef
Zurück zum Zitat Chien, H.-Y. (2015). De-synchronization attack on quadratic residues-based RFID ownership transfer. In Proceedings of 2015 10th Asia Joint Conference on Information Security (AsiaJCIS), Kaohsiung City, Taiwan, pp. 42–47. Chien, H.-Y. (2015). De-synchronization attack on quadratic residues-based RFID ownership transfer. In Proceedings of 2015 10th Asia Joint Conference on Information Security (AsiaJCIS), Kaohsiung City, Taiwan, pp. 42–47.
Zurück zum Zitat Cong, G., Zhang, Z.-J., Zhu, L.-H., Tan, Y.-A., & Zhen, Y. (2014). A novel secure group RFID authentication protocol. The Journal of China Universities of Posts and Telecommunications, 21, 94–103. Cong, G., Zhang, Z.-J., Zhu, L.-H., Tan, Y.-A., & Zhen, Y. (2014). A novel secure group RFID authentication protocol. The Journal of China Universities of Posts and Telecommunications, 21, 94–103.
Zurück zum Zitat Dimitriou, T. (2016). Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags. Ad Hoc Networks, 37, 195–208.CrossRef Dimitriou, T. (2016). Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags. Ad Hoc Networks, 37, 195–208.CrossRef
Zurück zum Zitat Doss, R., Sundaresan, S., & Zhou, W. (2013a). A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks, 11, 383–396.CrossRef Doss, R., Sundaresan, S., & Zhou, W. (2013a). A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks, 11, 383–396.CrossRef
Zurück zum Zitat Doss, R., Zhou, W., & Yu, S. (2013b). Secure RFID tag ownership transfer based on quadratic residues. IEEE Transactions on Information Forensics and Security, 8, 390–401.CrossRef Doss, R., Zhou, W., & Yu, S. (2013b). Secure RFID tag ownership transfer based on quadratic residues. IEEE Transactions on Information Forensics and Security, 8, 390–401.CrossRef
Zurück zum Zitat Edelev, S., Taheri, S., & Hogrefe, D. (2015). A secure minimalist RFID authentication and an ownership transfer protocol compliant to EPC C1G2. In Proceedings of 2015 I.E. International Conference on RFID Technology and Applications (RFID-TA) Tokyo, Japan, pp. 126–133. Edelev, S., Taheri, S., & Hogrefe, D. (2015). A secure minimalist RFID authentication and an ownership transfer protocol compliant to EPC C1G2. In Proceedings of 2015 I.E. International Conference on RFID Technology and Applications (RFID-TA) Tokyo, Japan, pp. 126–133.
Zurück zum Zitat Forouzan, B. A., & Mukhopadhyay, D. (2011). Cryptography and network security (sie): McGraw-Hill Education. Forouzan, B. A., & Mukhopadhyay, D. (2011). Cryptography and network security (sie): McGraw-Hill Education.
Zurück zum Zitat Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of Computing, Bethesda, pp. 169–178. Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of Computing, Bethesda, pp. 169–178.
Zurück zum Zitat Gentry, C. (2010) Toward basing fully homomorphic encryption on worst-case hardness. In Proceedings of Annual Cryptology Conference, Santa Barbara, pp. 116–137. Gentry, C. (2010) Toward basing fully homomorphic encryption on worst-case hardness. In Proceedings of Annual Cryptology Conference, Santa Barbara, pp. 116–137.
Zurück zum Zitat Goldwasser, S., & Micali, S. (1984). Probabilistic encryption. Journal of Computer and System Sciences, 28, 270–299.CrossRef Goldwasser, S., & Micali, S. (1984). Probabilistic encryption. Journal of Computer and System Sciences, 28, 270–299.CrossRef
Zurück zum Zitat Kapoor, G., & Piramuthu, S. (2012). Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42, 164–173.CrossRef Kapoor, G., & Piramuthu, S. (2012). Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42, 164–173.CrossRef
Zurück zum Zitat Lee, C.-C., Cheng, C.-L., Lai, Y.-M., & Li, C.-T. (2016). Cryptanalysis of Dimitriou's key evolving RFID systems. In Proceedings of the Fifth International Conference on Network, Communication and Computing, Kyoto, pp. 229–233. Lee, C.-C., Cheng, C.-L., Lai, Y.-M., & Li, C.-T. (2016). Cryptanalysis of Dimitriou's key evolving RFID systems. In Proceedings of the Fifth International Conference on Network, Communication and Computing, Kyoto, pp. 229–233.
Zurück zum Zitat Li, G., Xu, X., & Li, Q., (2015). LADP: A lightweight authentication and delegation protocol for RFID tags. In Proceedings of 2015 Seventh International Conference on Ubiquitous and Future Networks (ICUFN), Sapporo, pp. 860–865. Li, G., Xu, X., & Li, Q., (2015). LADP: A lightweight authentication and delegation protocol for RFID tags. In Proceedings of 2015 Seventh International Conference on Ubiquitous and Future Networks (ICUFN), Sapporo, pp. 860–865.
Zurück zum Zitat Li, Z., Zhong, X., Chen, X., & Liu, J. (2016). A lightweight hash-based mutual authentication protocol for RFID. In Proceedings of International Workshop on Management of Information, Processes and Cooperation, Hangzhou, pp. 87–98. Li, Z., Zhong, X., Chen, X., & Liu, J. (2016). A lightweight hash-based mutual authentication protocol for RFID. In Proceedings of International Workshop on Management of Information, Processes and Cooperation, Hangzhou, pp. 87–98.
Zurück zum Zitat Lien, Y.-H., Hsi, C.-T., Leng, X., Chiu, J.-H., & Chang, H. K.-C. (2012). An RFID based multi-batch supply chain systems. Wireless Personal Communications, 63, 393–413.CrossRef Lien, Y.-H., Hsi, C.-T., Leng, X., Chiu, J.-H., & Chang, H. K.-C. (2012). An RFID based multi-batch supply chain systems. Wireless Personal Communications, 63, 393–413.CrossRef
Zurück zum Zitat Lin, I.-C., Hsu, H.-H., & Cheng, C.-Y. (2015). A cloud-based authentication protocol for RFID supply chain systems. Journal of Network and Systems Management, 23, 978–997.CrossRef Lin, I.-C., Hsu, H.-H., & Cheng, C.-Y. (2015). A cloud-based authentication protocol for RFID supply chain systems. Journal of Network and Systems Management, 23, 978–997.CrossRef
Zurück zum Zitat Mujahid, U., Najam-ul-Islam, M., & Sarwar, S. (2016). A new ultralightweight rfid authentication protocol for passive low cost tags: Kmap. Wireless Personal Communications, 1–20. Mujahid, U., Najam-ul-Islam, M., & Sarwar, S. (2016). A new ultralightweight rfid authentication protocol for passive low cost tags: Kmap. Wireless Personal Communications, 1–20.
Zurück zum Zitat Munilla, J., Guo, F., & Susilo, W. (2013). Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme. Wireless Personal Communications, 72, 245–258.CrossRef Munilla, J., Guo, F., & Susilo, W. (2013). Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme. Wireless Personal Communications, 72, 245–258.CrossRef
Zurück zum Zitat Munilla, J., Burmester, M., & Peinado, A. (2016). Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments. Computer Communications, 88, 84–88.CrossRef Munilla, J., Burmester, M., & Peinado, A. (2016). Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments. Computer Communications, 88, 84–88.CrossRef
Zurück zum Zitat Niu, H., Taqieddin, E., & Jagannathan, S. (2016). EPC Gen2v2 RFID standard authentication and ownership management protocol. IEEE Transactions on Mobile Computing, 15, 137–149.CrossRef Niu, H., Taqieddin, E., & Jagannathan, S. (2016). EPC Gen2v2 RFID standard authentication and ownership management protocol. IEEE Transactions on Mobile Computing, 15, 137–149.CrossRef
Zurück zum Zitat Ray, B. R., Abawajy, J., Chowdhury, M., & Alelaiwi, A. A. (2017). Universal and secure object ownership transfer protocol for the internet of things. To appear in Future Generation Computer Systems. Ray, B. R., Abawajy, J., Chowdhury, M., & Alelaiwi, A. A. (2017). Universal and secure object ownership transfer protocol for the internet of things. To appear in Future Generation Computer Systems.
Zurück zum Zitat Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation, 4, 169–180. Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation, 4, 169–180.
Zurück zum Zitat K. H. Rosen, (1993) Elementary number theory and its applications: Addison-Wesley. K. H. Rosen, (1993) Elementary number theory and its applications: Addison-Wesley.
Zurück zum Zitat Shen, H., Shen, J., Khan, M. K., & Lee, J.-H. (2016). Efficient RFID authentication using elliptic curve cryptography for the internet of things. Wireless Personal Communications, 1–14. Shen, H., Shen, J., Khan, M. K., & Lee, J.-H. (2016). Efficient RFID authentication using elliptic curve cryptography for the internet of things. Wireless Personal Communications, 1–14.
Zurück zum Zitat Shen, J., Tan, H., Zhang, Y., Sun, X., & Xiang, Y. (2017). A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimedia Tools and Applications, 76, 22761–22783. Shen, J., Tan, H., Zhang, Y., Sun, X., & Xiang, Y. (2017). A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimedia Tools and Applications, 76, 22761–22783.
Zurück zum Zitat Su, C., Santoso, B., Li, Y., Deng, R., & Huang, X. (2017). Universally composable RFID mutual authentication. IEEE Transactions on Dependable and Secure Computing, 14, 83–94. Su, C., Santoso, B., Li, Y., Deng, R., & Huang, X. (2017). Universally composable RFID mutual authentication. IEEE Transactions on Dependable and Secure Computing, 14, 83–94.
Zurück zum Zitat Sundaresan, S., Doss, R., Zhou, W., & Piramuthu, S. (2015). Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Computer Communications, 55, 112–124.CrossRef Sundaresan, S., Doss, R., Zhou, W., & Piramuthu, S. (2015). Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Computer Communications, 55, 112–124.CrossRef
Zurück zum Zitat Surekha, B., Narayana, K. L., Jayaprakash, P., & Vorugunti, C. S. (2016). A realistic lightweight authentication protocol for securing cloud based RFID system. In Proceedings of 2016 I.E. International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, 54–60. Surekha, B., Narayana, K. L., Jayaprakash, P., & Vorugunti, C. S. (2016). A realistic lightweight authentication protocol for securing cloud based RFID system. In Proceedings of 2016 I.E. International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, 54–60.
Zurück zum Zitat Tewari, A., & Gupta, B. (2017). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing, 73, 1085–1102.CrossRef Tewari, A., & Gupta, B. (2017). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing, 73, 1085–1102.CrossRef
Zurück zum Zitat Yang, M. H. (2012). Secure multiple group ownership transfer protocol for mobile RFID. Electronic Commerce Research and Applications, 11, 361–373.CrossRef Yang, M. H. (2012). Secure multiple group ownership transfer protocol for mobile RFID. Electronic Commerce Research and Applications, 11, 361–373.CrossRef
Zurück zum Zitat Zhang, R., Zhu, L., Xu, C., & Yi, Y. (2015). An efficient and secure RFID batch authentication protocol with group tags ownership transfer. In Proceedings of 2015 I.E. Conference on Collaboration and Internet Computing (CIC), Hangzhou, pp. 168–175. Zhang, R., Zhu, L., Xu, C., & Yi, Y. (2015). An efficient and secure RFID batch authentication protocol with group tags ownership transfer. In Proceedings of 2015 I.E. Conference on Collaboration and Internet Computing (CIC), Hangzhou, pp. 168–175.
Metadaten
Titel
A Novel Group Ownership Delegate Protocol for RFID Systems
verfasst von
Cheng-Chi Lee
Chun-Ta Li
Chung-Lun Cheng
Yan-Ming Lai
Athanasios V. Vasilakos
Publikationsdatum
19.02.2018
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 5/2019
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-018-9835-x

Weitere Artikel der Ausgabe 5/2019

Information Systems Frontiers 5/2019 Zur Ausgabe

Premium Partner