Skip to main content

A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity

  • Conference paper
  • First Online:
Lightweight Cryptography for Security and Privacy (LightSec 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8898))

Abstract

Yoking-proof in a Radio Frequency Identification (RFID) system provides the evidence that two RFID tags are simultaneously scanned by the RFID reader. Though there are numerous yoking-proof protocols, vulnerabilities related to security and privacy are found in many prior works. We introduce a new security definition that covers the man-in-the-middle (MIM) attack, and a privacy definition based on an indistinguishability framework. We also provide a simple construction of a provably secure offline yoking-proof protocol based on the pseudorandom function.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Tag authentication by the reader can be one application, but it is not a necessary issue in yoking-proof protocols.

References

  1. Bringer, J., Chabanne, H., Dottax, E.: HB++: a lightweight authentication protocol secure against some attacks. In: SecPerU 2006, pp. 28–33 (2006)

    Google Scholar 

  2. Batina, L., Lee, Y.K., Seys, S., Singelée, D., Verbauwhede, I.: Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. J. Pers. Ubiquit. Comput. 16(3), 323–335 (2012). Springer, Heidelberg

    Article  Google Scholar 

  3. Burmester, M., de Medeiros, B., Motta, R.: Provably secure grouping-proofs for RFID tags. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 176–190. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Bolotnyy, L., Robins, G.: Generalized “yoking-proofs” for a groupe of RFID tags. In: Mobiquitous 2006, pp. 1–4. IEEE (2006)

    Google Scholar 

  5. Bagheri, N., Safkhani, M.: Securet disclosure attack on Kazahaya, a yoking-proof for low-cost RFID tags. Cryptology ePrint Archive, Report 2013/453

    Google Scholar 

  6. Chien, H.-Y., Liu, S.-B.: Tree-based RFID yoking proof. In: NSWCTC 2009, pp. 550–553. IEEE (2009)

    Google Scholar 

  7. Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A new framework for RFID privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1–18. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Gilbert, H., Robshaw, M., Sibert, H.: An active attack against HB+ - a provably secure lightweight authentication protocol. IEEE Electron. Lett. 41(21), 1169–1170 (2005). IEEE

    Article  Google Scholar 

  9. Gilbert, H., Robshaw, M., Seurin, Y.: Good variants of HB\(^{+}\) are hard to find. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 156–170. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  10. Huang, H.-H., Ku, C.-Y.: A RFID grouping proof protocol for medication sefety of inpatient. J. Med. Syst. 33(6), 467–474 (2009). Springer, Heidelberg

    Article  Google Scholar 

  11. Hermans, J., Peeters, R.: Private yoking proofs: attacks, models and new provable constructions. In: Hoepman, J.-H., Verbauwhede, I. (eds.) RFIDSec 2012. LNCS, vol. 7739, pp. 96–108. Springer, Heidelberg (2013)

    Google Scholar 

  12. Hermans, J., Pashalidis, A., Vercauteren, F., Preneel, B.: A new RFID privacy model. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 568–587. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  13. Juels, A.: “Yoking-proofs” for RFID tags. In: PerSec 2004, pp. 138–143. IEEE (2004)

    Google Scholar 

  14. Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM TISSEC 13(1), 7 (2009). ACM

    Google Scholar 

  16. Lin, C.-C., Lai, Y.-C., Tygar, J.D., Yang, C.-K., Chiang, C.-L.: Coexistence proof using chain of timestamps for multiple RFID tags. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb/WAIM 2007 Ws. LNCS, vol. 4537, pp. 634–643. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  17. Moriyama, D., Matsuo, S., Ohkubo, M.: Relations among notions of privacy for RFID authentication protocols. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 661–678. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  18. Ouafi, K., Overbeck, R., Vaudenay, S.: On the security of HB# against a man-in-the-middle attack. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 108–124. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  19. Piramuthu, S.: On existence proofs for multiple RFID tags. In: PerSecU 2006, pp. 317–328. IEEE (2006)

    Google Scholar 

  20. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Solving the simulutaneous scanning proglem anonymously: clumping proofs for RFID tags. In: SecPerU 2007, pp. 55–60. IEEE (2007)

    Google Scholar 

  21. Peris-Lopez, P., Orfila, A., Hernandez-Castro, J.C., Lubbe, J.C.A.: Flaws on RFID grouping-proofs. guidelines for future sound protocols. J. Netw. Comput. Appl. 34(3), 833–845 (2011). Academic Press

    Article  Google Scholar 

  22. Saito, J., Sakurai, K.: Grouping proof for RIFD tags. In: AINA 2005, vol. 2. pp. 621–624. IEEE (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daisuke Moriyama .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Moriyama, D. (2015). A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity. In: Eisenbarth, T., Öztürk, E. (eds) Lightweight Cryptography for Security and Privacy. LightSec 2014. Lecture Notes in Computer Science(), vol 8898. Springer, Cham. https://doi.org/10.1007/978-3-319-16363-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16363-5_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16362-8

  • Online ISBN: 978-3-319-16363-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics