Skip to main content
Log in

Improved yoking proof protocols for preserving anonymity

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

In emerging RFID applications, the yoking proof provides a method not only to ensure the physical proximity of multiple objects but also to verify that a pair of RFID tags has been scanned simultaneously by a reader. Previous studies have focused on generating the yoking proof, but have not been successful in preserving the anonymity of tags. In this paper, we address two attacks on tracking RFID tags and propose a new yoking proof protocol to improve anonymity of the tags. For better practicality, we also present authenticated yoking proof generation against DoS attacks on the system. Our analysis shows that the proposed protocols achieves improved anonymity effectively. Specifically, the protocols require the least number of computational steps and modules in a tag, while preserving its anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Juels, A.: Yoking proofs for RFID tags. In: Proceedings of the 2nd IEEE Annual Conference on Computing and Communication Workshops, pp. 138–143. IEEE, Orlando, Florida (2008). doi:10.1109/PERCOMW.2004.1276920

  2. Saito, J., Sakurai, K.: Grouping proof for RFID tags. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, vol. 2, pp. 621–624. IEEE, Taipei, Taiwan (2005). doi:10.1109/AINA.2005.197

  3. Piramuthu, S.: On existence proofs for multiple RFID tags. In: Proceeding of ACS/IEEE International Conference on Pervasive Services, pp. 317–320. IEEE, Lyon, France (2006). doi:10.1109/PERSER.2006.1652252

  4. Bolotnyy, L., Robins, G.: Generalized yoking proofs for a group of RFID tags. In: Proceeding of the 3rd International Conference on Mobile and Ubiquitous Systems Workshops, pp. 1–4. IEEE, San Jose, CA (2006). doi:10.1109/MOBIQW.2006.361727

  5. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags. In: Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp. 55–60. IEEE, Istanbul, Turkey (2007). doi:10.1109/SECPERU.2007.12

  6. Cho, J.-S., Yeo, S.-S., Hwang, S., Rhee, S.-Y., Kim. S.-K.: Enhanced yoking proof protocols for RFID tags and tag groups. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications-Workshops, WAINA’08, pp. 1591–1596. IEEE, Okinawa, Japan (2008). doi:10.1109/WAINA.2008.204

  7. Lien, Y., Leng, X., Mayes, K., Chiu, J.-H.: Reading order independent grouping proof for RFID tags. In: Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp. 128–136. IEEE, Taipei, Taiwan (2008). doi:10.1109/ISI.2008.4565042

  8. Burmester, M., Medeiros, B., Motta, R.: Provably secure grouping-proofs for RFID tags. In: Proceedings of the 8th IFIP international conference on Smart Card Research and Advanced Applications, pp. 176–190, Springer-Verlag, Berlin, Heidelberg (2008). doi:10.1007/978-3-540-85893-5_13

  9. Klaus, F.: RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication, 3rd edn. Wiley, Newyork (2010)

    Google Scholar 

  10. Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures, In: Proceedings of the 11th ACM conference on Computer and Communications Security, pp. 210–219. ACM, NY (2004). doi:10.1145/1030083.1030112

  11. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification. Lecture Notes in Computer Science Security in Pervasive Computing. Springer, Berlin (2004). doi:10.1007/978-3-540-39881-3_18

    Book  Google Scholar 

  12. Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE. Trans. Parallel. Distrib. 23(8), 1536–1550 (2012). doi:10.1109/DSN.2010.5545008

    Article  Google Scholar 

  13. Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM. Trans. Inf. Syst. Secur. 13(1), 1–23 (2009). doi:10.1145/1609956.1609963

    Article  Google Scholar 

  14. Chiu, CTan, Bo, Sheng, Qun, Li: Secure and serverless RFID authentication and search protocols. IEEE. Trans. Wirel. Commun. 7(4), 1400–1407 (2008). doi:10.1109/TWC.2008.061012

    Article  Google Scholar 

  15. Chiu, CTan, Bo, Sheng, Qun, Li: Efficient techniques for monitoring missing RFID tags. IEEE. Trans. Wirel. Commun 9(6), 1882–1889 (2010). doi:10.1109/TWC.2010.06.081301

    Article  Google Scholar 

  16. Chien, H.Y.: Tree-based matched RFID yoking making it more practical and efficient. Int. J. Comput. Inf. Sci. 1(1), 1–7 (2009)

    MathSciNet  Google Scholar 

  17. Lo, N., Yeh, K.: Anonymous coexistence proofs for RFID tags. J. Inf. Syst. Edu. 26(4), 1213–1230 (2010)

    Google Scholar 

  18. Peris-Lopez, P., Orfila, A., Hernandez-Castro, J.C., Van der Lubbe, Jan C.A.: Flaws on RFID grouping-proofs. Guidelines for future sound. J. Netw. Comput. Appl. 34(3), 833–845 (2011). doi:10.1016/j.jnca.2010.04.008

    Article  Google Scholar 

  19. Ma, C., Lin, J., Wang, Y., Shang, M.: Offline RFID grouping proofs with trusted timestamps. In: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 674–681, IEEE, UK, Liverpool (2012). doi:10.1109/TrustCom.2012.212

  20. Chen, C.L., Wu, C.Y., Leu, F.Y., Huang, Y.L.: Using RFID yoking proof to design a supply-chain applications for customs check. IT CoNvergence PRActice (INPRA). 1(2), 34–53 (2013)

    Google Scholar 

  21. Yang, M.H., Luo, J.N., Lu, S.Y.: A novel multilayered RFID tagged cargo integrity assurance scheme. Sensors 15(10), 27087 (2015). doi:10.3390/s151027087

    Article  Google Scholar 

  22. Trçek, D.: Wireless sensors grouping proofs for medical care and ambient assisted-living deployment. Sensors 16(1), 33 (2016). doi:10.3390/s16010033

    Article  Google Scholar 

  23. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: Proceedings of RFID Privacy Workshop, pp. 19, Graz, Austria, (2005)

  24. Avoine, G.: Adversarial model for radio frequency identification. ePrint Archive. http://eprint.iacr.org (2005)

Download references

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(2015R1D1A1A01058928).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to HyoungMin Ham.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ham, H., Lee, J. & Song, J. Improved yoking proof protocols for preserving anonymity. Int. J. Inf. Secur. 17, 379–393 (2018). https://doi.org/10.1007/s10207-017-0383-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-017-0383-z

Keywords

Navigation