Advertisement

International Journal of Information Security

, Volume 17, Issue 4, pp 379–393 | Cite as

Improved yoking proof protocols for preserving anonymity

  • HyoungMin Ham
  • JongHyup Lee
  • JooSeok Song
Regular Contribution
  • 173 Downloads

Abstract

In emerging RFID applications, the yoking proof provides a method not only to ensure the physical proximity of multiple objects but also to verify that a pair of RFID tags has been scanned simultaneously by a reader. Previous studies have focused on generating the yoking proof, but have not been successful in preserving the anonymity of tags. In this paper, we address two attacks on tracking RFID tags and propose a new yoking proof protocol to improve anonymity of the tags. For better practicality, we also present authenticated yoking proof generation against DoS attacks on the system. Our analysis shows that the proposed protocols achieves improved anonymity effectively. Specifically, the protocols require the least number of computational steps and modules in a tag, while preserving its anonymity.

Keywords

RFID Privacy Yoking proof Anonymity 

Notes

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(2015R1D1A1A01058928).

References

  1. 1.
    Juels, A.: Yoking proofs for RFID tags. In: Proceedings of the 2nd IEEE Annual Conference on Computing and Communication Workshops, pp. 138–143. IEEE, Orlando, Florida (2008). doi: 10.1109/PERCOMW.2004.1276920
  2. 2.
    Saito, J., Sakurai, K.: Grouping proof for RFID tags. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, vol. 2, pp. 621–624. IEEE, Taipei, Taiwan (2005). doi: 10.1109/AINA.2005.197
  3. 3.
    Piramuthu, S.: On existence proofs for multiple RFID tags. In: Proceeding of ACS/IEEE International Conference on Pervasive Services, pp. 317–320. IEEE, Lyon, France (2006). doi: 10.1109/PERSER.2006.1652252
  4. 4.
    Bolotnyy, L., Robins, G.: Generalized yoking proofs for a group of RFID tags. In: Proceeding of the 3rd International Conference on Mobile and Ubiquitous Systems Workshops, pp. 1–4. IEEE, San Jose, CA (2006). doi: 10.1109/MOBIQW.2006.361727
  5. 5.
    Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags. In: Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp. 55–60. IEEE, Istanbul, Turkey (2007). doi: 10.1109/SECPERU.2007.12
  6. 6.
    Cho, J.-S., Yeo, S.-S., Hwang, S., Rhee, S.-Y., Kim. S.-K.: Enhanced yoking proof protocols for RFID tags and tag groups. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications-Workshops, WAINA’08, pp. 1591–1596. IEEE, Okinawa, Japan (2008). doi: 10.1109/WAINA.2008.204
  7. 7.
    Lien, Y., Leng, X., Mayes, K., Chiu, J.-H.: Reading order independent grouping proof for RFID tags. In: Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp. 128–136. IEEE, Taipei, Taiwan (2008). doi: 10.1109/ISI.2008.4565042
  8. 8.
    Burmester, M., Medeiros, B., Motta, R.: Provably secure grouping-proofs for RFID tags. In: Proceedings of the 8th IFIP international conference on Smart Card Research and Advanced Applications, pp. 176–190, Springer-Verlag, Berlin, Heidelberg (2008). doi: 10.1007/978-3-540-85893-5_13
  9. 9.
    Klaus, F.: RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication, 3rd edn. Wiley, Newyork (2010)Google Scholar
  10. 10.
    Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures, In: Proceedings of the 11th ACM conference on Computer and Communications Security, pp. 210–219. ACM, NY (2004). doi: 10.1145/1030083.1030112
  11. 11.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification. Lecture Notes in Computer Science Security in Pervasive Computing. Springer, Berlin (2004). doi: 10.1007/978-3-540-39881-3_18 CrossRefGoogle Scholar
  12. 12.
    Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE. Trans. Parallel. Distrib. 23(8), 1536–1550 (2012). doi: 10.1109/DSN.2010.5545008 CrossRefGoogle Scholar
  13. 13.
    Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM. Trans. Inf. Syst. Secur. 13(1), 1–23 (2009). doi: 10.1145/1609956.1609963 CrossRefGoogle Scholar
  14. 14.
    Chiu, CTan, Bo, Sheng, Qun, Li: Secure and serverless RFID authentication and search protocols. IEEE. Trans. Wirel. Commun. 7(4), 1400–1407 (2008). doi: 10.1109/TWC.2008.061012 CrossRefGoogle Scholar
  15. 15.
    Chiu, CTan, Bo, Sheng, Qun, Li: Efficient techniques for monitoring missing RFID tags. IEEE. Trans. Wirel. Commun 9(6), 1882–1889 (2010). doi: 10.1109/TWC.2010.06.081301 CrossRefGoogle Scholar
  16. 16.
    Chien, H.Y.: Tree-based matched RFID yoking making it more practical and efficient. Int. J. Comput. Inf. Sci. 1(1), 1–7 (2009)MathSciNetGoogle Scholar
  17. 17.
    Lo, N., Yeh, K.: Anonymous coexistence proofs for RFID tags. J. Inf. Syst. Edu. 26(4), 1213–1230 (2010)Google Scholar
  18. 18.
    Peris-Lopez, P., Orfila, A., Hernandez-Castro, J.C., Van der Lubbe, Jan C.A.: Flaws on RFID grouping-proofs. Guidelines for future sound. J. Netw. Comput. Appl. 34(3), 833–845 (2011). doi: 10.1016/j.jnca.2010.04.008 CrossRefGoogle Scholar
  19. 19.
    Ma, C., Lin, J., Wang, Y., Shang, M.: Offline RFID grouping proofs with trusted timestamps. In: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 674–681, IEEE, UK, Liverpool (2012). doi: 10.1109/TrustCom.2012.212
  20. 20.
    Chen, C.L., Wu, C.Y., Leu, F.Y., Huang, Y.L.: Using RFID yoking proof to design a supply-chain applications for customs check. IT CoNvergence PRActice (INPRA). 1(2), 34–53 (2013)Google Scholar
  21. 21.
    Yang, M.H., Luo, J.N., Lu, S.Y.: A novel multilayered RFID tagged cargo integrity assurance scheme. Sensors 15(10), 27087 (2015). doi: 10.3390/s151027087 CrossRefGoogle Scholar
  22. 22.
    Trçek, D.: Wireless sensors grouping proofs for medical care and ambient assisted-living deployment. Sensors 16(1), 33 (2016). doi: 10.3390/s16010033 CrossRefGoogle Scholar
  23. 23.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: Proceedings of RFID Privacy Workshop, pp. 19, Graz, Austria, (2005)Google Scholar
  24. 24.
    Avoine, G.: Adversarial model for radio frequency identification. ePrint Archive. http://eprint.iacr.org (2005)

Copyright information

© Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  1. 1.Department of Computer ScienceYonsei UniversitySeoulKorea
  2. 2.Department of Mathematical FinanceGachon UniversitySeongnam-siKorea

Personalised recommendations