Abstract
As more and more items tagged with RFID tags, the grouping-proof technology which is used to provide a coexistence evidence for a group of related items has become widely utilized. Due to the wireless channel used in RFID systems, security risk exists in the communication between the reader and tags. How to ensure the tag’s information security and generate reliable grouping-proof becomes a hot research topic. In this paper, an ECC-based off-line anonymous grouping-proof protocol (EAGP) is proposed. Different from the traditional methods which leave the verification process completely to background server, the EAGP authorizes the reader to verify the validity of group-proof without knowing the identity of tags. From the security analysis, the EAGP can protect the security and privacy of RFID tags, defense impersonations and replay attacks. Furthermore, it has the ability to prevent the system overhead caused by invalid submission of grouping-proofs from reader. As a result, the proposed EAGP equips practical application values.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Juels, A.: “ Yoking-Proofs” for RFID Tags. In: PerCom Workshops, pp. 138–143 (2004)
Peris-Lopez, P., Orfila, A., Mitrokotsa, A., Van der Lubbe, J.C.: A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1), 13–24 (2011)
Chen, Y.-Y., Tsai, M.-L.: An RFID solution for enhancing inpatient medication safety with real-time verifiable grouping-proof. Int. J. Med. Inform. 83, 70–81 (2014)
Chen, C.-L., Wu, C.-Y.: Using RFID yoking proof protocol to enhance inpatient medication safety. J. Med. Syst. 36, 2849–2864 (2012). Informatics, vol. 80, pp. 13–24 (2011)
Zhou, Z., Liu, Q., Wang, G., Jia, W.: Secure medication scheme using the grouping-proof technology. J. Chin. Comput. Syst. 36, 2349–2353 (2015)
Peris-Lopez, P., Orfila, A., Hernandez-Castro, J.C., van der Lubbe, J.C.A.: Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Netw. Comput. Appl. 34, 833–845 (2011)
Xie, K., Cao, J., Wang, X., et al.: Optimal resource allocation for reliable and energy efficient cooperative communications. IEEE Trans. Wirel. Commun. 12, 4994–5007 (2013)
Sundaresan, S., Doss, R., Zhou, W.: Offline grouping proof protocol for RFID systems. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 247–252 (2013)
Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., Yang, L.: Grouping-proofs-based authentication protocol for distributed RFID systems. IEEE Trans. Parallel Distrib. Syst. 24(7), 1321–1330 (2013)
Chien, H.-Y., Liu, S.-B.: Tree-based RFID yoking proof. In: 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009, pp. 550–553 (2009)
Lien, Y., Leng, X., Mayes, K., Chiu, J.-H.: Reading order independent grouping proof for RFID tags. In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, pp. 128–136 (2008)
Piramuthu, S.: On existence proofs for multiple RFID tags. In: ACS/IEEE International Conference on Pervasive Services, pp. 317–320 (2006)
Li, N., Mu, Y., Susilo, W., Varadharajan, V.: Anonymous yoking-group proofs. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 615–620 (2015)
Ma, C., Lin, J., Wang, Y., Shang, M.: Offline RFID grouping proofs with trusted timestamps. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 674–681 (2012)
Cho, J.S., Yeo, S.S., Hwang, S., Rhee, S.Y., Kim, S.K.: Enhanced yoking proof protocols for RFID tags and tag groups. In: 22nd International Conference on Advanced Information Networking and Applications - Workshops, AINAW 2008, pp. 1591–1596 (2008)
Hong-yan, K.: Analysis and improvement of ECC-based grouping-proof protocol for RFID. Int. J. Control Autom. 9, 343–352 (2016)
Lo, N.-W., Yeh, K.-H.: Anonymous coexistence proofs for RFID tags. J. Inf. Sci. Eng. 26, 1213–1230 (2010)
Burmester, M., De Medeiros, B., Motta, R.: Provably secure grouping-proofs for RFID tags. In: International Conference on Smart Card Research and Advanced Applications, pp. 176–190 (2008)
Burmester, M., Munilla, J.: An anonymous RFID grouping-proof with missing tag identification. In: 10th IEEE International Conference on Radio-Frequency Identification, pp. 3–5 (2016)
Wolkerstorfer, J.: Is elliptic-curve cryptography suitable to secure RFID tags. In: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto (2005)
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: An elliptic curve processor suitable For RFID-tags. IACR Cryptology ePrint Archive, vol. 2006 p. 227 (2006)
Batina, L., Lee, Y.K., Seys, S., Singele, D., Verbauwhede, I.: Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Pers. Ubiquit. Comput. 16, 323–335 (2012)
Li, H., Lv, C., Ma, J., et al.: Security analysis of a privacy-preserving ECC-based grouping-proof protocol. J. Convergence Inf. Technol. 6, 113–119 (2011)
Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. IEEE Computer Society (2001)
Lin, Q., Zhang, F.: ECC-based grouping-proof RFID for inpatient medication safety. J. Med. Syst. 36, 3527–3531 (2012)
Menezes, A.: Evaluation of security level of cryptography: the Elliptic Curve Discrete Logarithm Problem (ECDLP). University of Waterloo (2001)
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451 and 61402161, the High Level Talents Program of Higher Education in Guangdong Province under Grant Number 2016ZJ01, the Hunan Provincial Education Department of China under Grant Number 2015C0589, the Hunan Provincial Natural Science Foundation of China under Grant Number 2015JJ3046, the Fundamental Research Funds for the Central Universities of Central South University under Grant Number 2016zzts058.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhou, Z., Liu, P., Liu, Q., Wang, G. (2017). An ECC-Based Off-line Anonymous Grouping-Proof Protocol. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-72389-1_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72388-4
Online ISBN: 978-3-319-72389-1
eBook Packages: Computer ScienceComputer Science (R0)