Abstract
We address the problem of batch tag authentication. Leveraging from previous work in the field we provide analysis of its shortcomings and provide usable extension to the protocols. The direct contribution of this paper is a computationally-efficient method of verification and identification of a subset of tags within a batch, in a system where the reader does not have to be a trusted party, and the tags can achieve reasonable anonymity.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Epcglobal: EPC Tag Data Standards Version 1.3 (2006)
Chen, J., Miyaji, A., Su, C.: A provable secure batch authentication scheme for EPCGen2 tags. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 103–116. Springer, Heidelberg (2014)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004). doi:10.1007/978-3-540-39881-3_18
Lu, L., Liu, Y., Han, J.: ACTION: breaking the privacy barrier for RFID systems. Ad Hoc Sens. Wireless Netw. 24(1–2), 135–159 (2015)
Yang, L., Han, J., Qi, Y., Liu, Y.: Identification-free batch authentication for RFID tags. In: Proceedings of the 18th Annual IEEE International Conference on Network Protocols, ICNP 2010, pp. 154–163. IEEE Computer Society (2010)
Gong, W., Liu, K., Miao, X., Ma, Q., Yang, Z., Liu, Y.: Informative counting: fine-grained batch authentication for large-scale RFID systems. In: Chockalingam, A., Manjunath, D., Franceschetti, M., Tassiulas, L., (eds.) The 14th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2013, pp. 21–30. ACM (2013)
Gong, W., Liu, Y., Nayak, A., Wang, C.: Wise counting: fast and efficient batch authentication for large-scale RFID systems. In: Wu, J., Cheng, X., Li, X., Sarkar, S., (eds.) The 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2014, pp. 347–356. ACM (2014)
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422–426 (1970)
Liu, X., Qi, H., Li, K., Stojmenovic, I., Liu, A.X., Shen, Y., Qu, W., Xue, W.: Sampling bloom filter-based detection of unknown RFID tags. IEEE Trans. Commun. 63(4), 1432–1442 (2015)
Kamaludin, H., Mahdin, H., Abawajy, J.H.: Filtering redundant data from RFID data streams. J. Sens. 2016, 7107914:1–7107914:7 (2016)
Mitzenmacher, M.: Bloom filters. In: Encyclopedia of Database Systems, pp. 252–255 (2009)
Acknowledgments
The paper was partially supported by the Polish National Science Center, based on the decision DEC-2013/08/M/ST6/00928, project HARMONIA.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Błaśkiewicz, P., Krzywiecki, Ł., Syga, P. (2016). RFID Tags Batch Authentication Revisited – Communication Overhead and Server Computational Complexity Limits. In: Bao, F., Chen, L., Deng, R., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2016. Lecture Notes in Computer Science(), vol 10060. Springer, Cham. https://doi.org/10.1007/978-3-319-49151-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-49151-6_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49150-9
Online ISBN: 978-3-319-49151-6
eBook Packages: Computer ScienceComputer Science (R0)