Abstract
In emerging RFID applications, the yoking proof provides a method not only to ensure the physical proximity of multiple objects but also to verify that a pair of RFID tags has been scanned simultaneously by a reader. Previous studies have focused on generating the yoking proof, but have not been successful in preserving the anonymity of tags. In this paper, we address two attacks on tracking RFID tags and propose a new yoking proof protocol to improve anonymity of the tags. For better practicality, we also present authenticated yoking proof generation against DoS attacks on the system. Our analysis shows that the proposed protocols achieves improved anonymity effectively. Specifically, the protocols require the least number of computational steps and modules in a tag, while preserving its anonymity.
Similar content being viewed by others
References
Juels, A.: Yoking proofs for RFID tags. In: Proceedings of the 2nd IEEE Annual Conference on Computing and Communication Workshops, pp. 138–143. IEEE, Orlando, Florida (2008). doi:10.1109/PERCOMW.2004.1276920
Saito, J., Sakurai, K.: Grouping proof for RFID tags. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, vol. 2, pp. 621–624. IEEE, Taipei, Taiwan (2005). doi:10.1109/AINA.2005.197
Piramuthu, S.: On existence proofs for multiple RFID tags. In: Proceeding of ACS/IEEE International Conference on Pervasive Services, pp. 317–320. IEEE, Lyon, France (2006). doi:10.1109/PERSER.2006.1652252
Bolotnyy, L., Robins, G.: Generalized yoking proofs for a group of RFID tags. In: Proceeding of the 3rd International Conference on Mobile and Ubiquitous Systems Workshops, pp. 1–4. IEEE, San Jose, CA (2006). doi:10.1109/MOBIQW.2006.361727
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags. In: Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp. 55–60. IEEE, Istanbul, Turkey (2007). doi:10.1109/SECPERU.2007.12
Cho, J.-S., Yeo, S.-S., Hwang, S., Rhee, S.-Y., Kim. S.-K.: Enhanced yoking proof protocols for RFID tags and tag groups. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications-Workshops, WAINA’08, pp. 1591–1596. IEEE, Okinawa, Japan (2008). doi:10.1109/WAINA.2008.204
Lien, Y., Leng, X., Mayes, K., Chiu, J.-H.: Reading order independent grouping proof for RFID tags. In: Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp. 128–136. IEEE, Taipei, Taiwan (2008). doi:10.1109/ISI.2008.4565042
Burmester, M., Medeiros, B., Motta, R.: Provably secure grouping-proofs for RFID tags. In: Proceedings of the 8th IFIP international conference on Smart Card Research and Advanced Applications, pp. 176–190, Springer-Verlag, Berlin, Heidelberg (2008). doi:10.1007/978-3-540-85893-5_13
Klaus, F.: RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication, 3rd edn. Wiley, Newyork (2010)
Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures, In: Proceedings of the 11th ACM conference on Computer and Communications Security, pp. 210–219. ACM, NY (2004). doi:10.1145/1030083.1030112
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification. Lecture Notes in Computer Science Security in Pervasive Computing. Springer, Berlin (2004). doi:10.1007/978-3-540-39881-3_18
Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE. Trans. Parallel. Distrib. 23(8), 1536–1550 (2012). doi:10.1109/DSN.2010.5545008
Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM. Trans. Inf. Syst. Secur. 13(1), 1–23 (2009). doi:10.1145/1609956.1609963
Chiu, CTan, Bo, Sheng, Qun, Li: Secure and serverless RFID authentication and search protocols. IEEE. Trans. Wirel. Commun. 7(4), 1400–1407 (2008). doi:10.1109/TWC.2008.061012
Chiu, CTan, Bo, Sheng, Qun, Li: Efficient techniques for monitoring missing RFID tags. IEEE. Trans. Wirel. Commun 9(6), 1882–1889 (2010). doi:10.1109/TWC.2010.06.081301
Chien, H.Y.: Tree-based matched RFID yoking making it more practical and efficient. Int. J. Comput. Inf. Sci. 1(1), 1–7 (2009)
Lo, N., Yeh, K.: Anonymous coexistence proofs for RFID tags. J. Inf. Syst. Edu. 26(4), 1213–1230 (2010)
Peris-Lopez, P., Orfila, A., Hernandez-Castro, J.C., Van der Lubbe, Jan C.A.: Flaws on RFID grouping-proofs. Guidelines for future sound. J. Netw. Comput. Appl. 34(3), 833–845 (2011). doi:10.1016/j.jnca.2010.04.008
Ma, C., Lin, J., Wang, Y., Shang, M.: Offline RFID grouping proofs with trusted timestamps. In: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 674–681, IEEE, UK, Liverpool (2012). doi:10.1109/TrustCom.2012.212
Chen, C.L., Wu, C.Y., Leu, F.Y., Huang, Y.L.: Using RFID yoking proof to design a supply-chain applications for customs check. IT CoNvergence PRActice (INPRA). 1(2), 34–53 (2013)
Yang, M.H., Luo, J.N., Lu, S.Y.: A novel multilayered RFID tagged cargo integrity assurance scheme. Sensors 15(10), 27087 (2015). doi:10.3390/s151027087
Trçek, D.: Wireless sensors grouping proofs for medical care and ambient assisted-living deployment. Sensors 16(1), 33 (2016). doi:10.3390/s16010033
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: Proceedings of RFID Privacy Workshop, pp. 19, Graz, Austria, (2005)
Avoine, G.: Adversarial model for radio frequency identification. ePrint Archive. http://eprint.iacr.org (2005)
Acknowledgements
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(2015R1D1A1A01058928).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ham, H., Lee, J. & Song, J. Improved yoking proof protocols for preserving anonymity. Int. J. Inf. Secur. 17, 379–393 (2018). https://doi.org/10.1007/s10207-017-0383-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-017-0383-z