Abstract
Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI) with Secure Multiparty Communication (SMC), a Forward-Secure Grouping-Proof Protocol (FSGP) for multiple RFID tags based on Shamir’s (n, n) secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.
Article PDF
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
A. Juels, Yokin g-proofs for RFID tags, in Proc. 2nd IEEE Annual Conference on PERCOMW’04 (IEEE Press 2004), pp. 138–143.
J. Saito, K. Sak urai, Grouping proof for RFID tags, in Proc. 19th IEEE International Conference on AINA ‘05 (IEEE Press 2005), pp. 621–624.
S. Piramuthu, On existence proofs for multiple RFID tags, in Proc. IEEE International Conference on ICPS’06 (IEEE Press 2004), pp. 317–320.
L. Bolotnyy and G. Robins, Generalized yoking-proofs for a group of RFID tags, in Proc. 3rd Annual International Conference on MUS’06 (2006), pp. 1–4.
P. Peris-Lopez, J. C. He rnandez-Castro, Estevez-Tapiador J. M., and Ribagorda A., Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags, in Proc. 3rd International Workshop on SPTPUC’07 (2007), pp. 55–60.
M. Burmester, B. D. Medeiros and R. Motta, Provably Secure Grouping-Proofs for RFID Tags, in Proc. 8th International Conference on CARDIS’08(Springer-Verlag, LNCS 5189, 2008) , pp.176–190.
C. C. Lin, Y. C. Lai, J. D. Tygar, C. K. Yang, and Chiang C. L., Coexistence proof using chain of timestamps for multiple RFID tags, in Proc. International Workshop on APWeb/WAIM’07(Springer-Verlag, LNCS 5189, 2007), pp.634–643.
Y. H. Lien, X.F.Leng,K. Mayes, and J. H. Chiu, Reading order independent grouping proof for RFID tags, in Proc. IEEE International Conference on ISI’08(IEEE Press 2004), pp. 128–136.
W. Pedrycz, A.V. Vasilakos, Computational intelligence in telecommunications networks (CRC Press, Boca Raton, FL, 2000) .
A.V. Vasilakos, W. Pedrycz, Ambient Intelligence, Wireless Networking, Ubiquitous Computing (Art House, MA, USA, 2006).
A. Konar, Computational Intelligence: Principles, Techniques and applications(Springer-Verlag, New York, 2005).
G. K. Venayagamoorthy, A successful in terdisciplinary course on computational intelligence, IEEE Computational Intelligence Mag. 4(1) (2009) 14–23.
A. P. Engelbrecht, Computational Intelligence: An Introduction, 2nd edn. (NY, USA: John Wiley & Sons, 2007).
H. Y. Chien, S. B. Liu, Tree-Based RFID Yoking Proof, in Proc. International Conference on NSWCTC’09 (IEEE Press 2009), pp. 550–553.
H. Y. Chien, C. C. Yang, T. C. Wu, C. F. Lee, Two RFID-based Solutions to Enhance Inpatient Medication Safety, J. Med. Syst. 35(3) (2011) 369–375.
M. Burmester, O. Munilla, Lightweight RFID authentication with forward and backward security, ACM Transactions on Information and System Security (TISSEC). 14 (1) (2011) 11–37.
H. Lein, L. L. Chang, Strong (n, t, n) verifiable secret sharing scheme, Information Sciences. (180) (2010) 3059–3064.
G. R. Blakley, Safeguarding cryptographic keys, in Proc. AFIPS Conf. (NCC, Arlington, Va. 48, 1979), pp. 313–317.
A. Shamir, How to share a secret, Communications of the ACM. 22(11) (1979) 612–613.
P. Peris-Lopez,, J. C. Hernandez-Castro, Estevez-Tapiador J. M., and Ribagorda A., LAMED – A PRNG for EPC class-1 generation-2 RFID specification, Computer Standards and Interfaces. (31) (2009) 88–97. LIU Ya-li et al.
EPCglobal Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9., Available from: http://www.EPCglobalinc.org/.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Liu, Yl., Qin, Xl., Li, Bh. et al. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags. Int J Comput Intell Syst 5, 824–833 (2012). https://doi.org/10.1080/18756891.2012.733209
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1080/18756891.2012.733209