Skip to main content
Log in

Solving Scalability Problems on Secure RFID Grouping-Proof Protocol

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Scalable grouping-proof protocol has broad and various RFID applications. It generates a proof to confirm scalable multiple co-existing tags within timeout period. The scalability problems focus on performance of generating the scalable grouping-proof, such as messages relay, collision, exhaustive search and computation load of lightweight tag. No integrated solution is presented to scalability problems on RFID grouping-proof. In this paper, a novel protocol is proposed to solve scalability problems and offer secure properties including the mutual authentication, replay attack prevention, forward security, anonymity, and forge proof resistance. In addition, the pseudo identity with direct search is used to provide the privacy and unlinkability. The proposed mechanism adopts broadcast and pre-ordering responses scheme to improve system performance. The achievement is based on reducing the number of message relay, avoiding collision of responses and computing simultaneously of multiple lightweight tags. The experimental results of simulation show that the scalability requirements on grouping-proof protocol are satisfied with our protocol. Within timeout period of 400 ms, the proposed protocol could provide a proof with a scale up to about 130 and 600 tags under data rate of 105 and 640 kbps. The scalability performance of the proposed protocol is more than 3 times better than the other grouping-proof protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Erguler, I., & Anarim, E. (2011). Scalability and security conflict for RFID authentication protocols. Wireless Personal Communications, 59(1), 43–56.

    Article  Google Scholar 

  2. Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 34(4), 556–566.

    Article  Google Scholar 

  3. Alomair, B., & Poovendran, R. (2010). Privacy versus scalability in radio frequency identification systems. Computer Communications, 33(18), 2155–2163.

    Article  Google Scholar 

  4. Duc, D. N., & Kim, K. (2009). Grouping-proof protocol for RFID tags: Security definition and scalable construction. International Association for Cryptologic Research, ePrint, 609, 1–9.

    Google Scholar 

  5. Juels, A. (2004). Yoking-proofs for RFID tags. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (pp. 138–143). DC, USA.

  6. Bolotnyy, L. & Robins, G. (2006). Generalized yoking-proofs for a group of RFID tags. Proceedings of IEEE International Conference on Mobile and Ubiquitous Systems (pp. 1–4). San Jose, California.

  7. Lin, C.-C., Lai, Y.-C., Tygar, J. D., Yang, C.-K., Chiang C.-L. (2007). Coexistence proof using chain of timestamps for multiple RFID tags. In The Proceedings of APWeb/WAIM International Workshop (pp. 634–643). Springer LNCS 5189.

  8. Cho, J.-S., Yeo, S.-S., Hwang, S., Rhee, S.-Y., Kim, S. K. (2008). Enhanced yoking proof protocols for RFID tags and tag groups. Proceedings of the 22nd Advanced Information Networking and Applications (pp. 1591–1596). Okinawa, Japan.

  9. Saito, J. & Sakural, K. (2005). Grouping proof for RFID tags. Proceedings of the 19th International Conference On AINA’05 (pp. 621–624). Taipei, Taiwan.

  10. Piramuthu, S. (2006). On existence proofs for multiple RFID tags. In The Proceedings of ACS/IEEE International Conference on Pervasive Services, IEEE Computer Society (pp. 317–320). Lyon, France.

  11. Burmester, M., Medeiros, B. de, Motta, R. (2008). ‘Provably secure grouping-proofs for RFID tags. In The Proceedings of CARDIS International Conference (pp. 176–190). Springer LNCS 5189.

  12. Duc, D.N., Kim, J., Kim, K. (2010). Scalable grouping-proof protocol for RFID tags. 2010 Symposium on Cryptography and Information Security (pp. 19–22). Japan: Takamatsu.

  13. Duc, D. N., Konidala, D. M., Lee, H., & Kim, K. (2010). A survey on RFID security and provably secure grouping-proof protocols. International Journal of Internet Technology and Secured Transactions, 2(3–4), 222–249.

    Article  Google Scholar 

  14. Duc, D. N., & Kim, K. (2010). On the security of RFID group scanning protocols. IEICE Transactions on Information and Systems, 93(3), 528–530.

    Google Scholar 

  15. Lo, N.-W., & Yeh, K.-H. (2010). Anonymous coexistence proofs for RFID tags. Journal of Information Science and Engineering, 26, 1213–1230.

    Google Scholar 

  16. Peris-Lopez, P., Orfila, A., Hernandez-Castro, J., & van der Lubbe, J. C. A. (2011). Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal Network and Computer Applications, 34(3), 833–845.

    Article  Google Scholar 

  17. Peris-Lopez, P., Orfila, A., Mitrokotsa, A., & van der Lubbe, J. C. A. (2011). A comprehensive RFID solution to enhance inpatient medication safety. International Journal of Medical Informatics, 80(1), 13–24.

    Article  Google Scholar 

  18. Huang, H., & Ku, C. (2009). A RFID grouping proof protocol for medication safety of inpatient. Journal Medical Systems, 33(6), 467–474.

    Article  Google Scholar 

  19. Chien, H., Yang, C., Wu, T., & Lee, C. (2011). Two RFID-based solutions to enhance inpatient medication safety. Journal Medical Systems, 35(3), 369–375.

    Article  Google Scholar 

  20. Leng, X., Lien, Y., Mayes, K., & Markantonakis, K. (2010). An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing. International Journal of Security and Networks, 5(23), 79–86.

    Article  Google Scholar 

  21. Liu, Y.-L., Qin, X.-L., Li, B.-H., & Liu, L. (2012). A forward-secure grouping-proof protocol for multiple RFID tags. International Journal of Computational Intelligence Systems, 5(5), 824–833.

    Article  Google Scholar 

  22. Ma, C., Lin, J., Wang, Y., Shang, M. (2012). Offline RFID grouping proofs with trusted timestamps. TRUSTCOM ‘12 Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 674–681). Liverpool, UK.

  23. Semtech International AG (2006) FCC Regulations for ISM Band Devices: 902–928 MHz.

  24. He, M., Horng, S.-J., Fan, P., Khan, M. K., Run, R.-S., Lai, J.-L., & Chen, R.-J. (2011). A fast RFID tag identification algorithm based on counter and stack. Expert Systems with Applications, 38, 6829–6838.

    Article  Google Scholar 

  25. International Organization for Standardization (2003) ISO/IEC 18000-3. Information Technology AIDC Techniques—RFID for Item Management.

  26. Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., & Ribagorda, A. (2009). LAMED—A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards & Interfaces, 31, 88–97.

    Article  Google Scholar 

  27. Melia-Segui, J., Garcia-Alfaro, J., & Herrera-Joancomarti, J. (2010). Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags. Financial Cryptography and Data Security, 6054, 34–46.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng-Ter Hsi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hsi, CT., Lien, YH., Chiu, JH. et al. Solving Scalability Problems on Secure RFID Grouping-Proof Protocol. Wireless Pers Commun 84, 1069–1088 (2015). https://doi.org/10.1007/s11277-015-2676-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2676-8

Keywords

Navigation