Skip to main content

RFID Tags Batch Authentication Revisited – Communication Overhead and Server Computational Complexity Limits

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10060))

Abstract

We address the problem of batch tag authentication. Leveraging from previous work in the field we provide analysis of its shortcomings and provide usable extension to the protocols. The direct contribution of this paper is a computationally-efficient method of verification and identification of a subset of tags within a batch, in a system where the reader does not have to be a trusted party, and the tags can achieve reasonable anonymity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Epcglobal: EPC Tag Data Standards Version 1.3 (2006)

    Google Scholar 

  2. Chen, J., Miyaji, A., Su, C.: A provable secure batch authentication scheme for EPCGen2 tags. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 103–116. Springer, Heidelberg (2014)

    Google Scholar 

  3. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004). doi:10.1007/978-3-540-39881-3_18

    Chapter  Google Scholar 

  4. Lu, L., Liu, Y., Han, J.: ACTION: breaking the privacy barrier for RFID systems. Ad Hoc Sens. Wireless Netw. 24(1–2), 135–159 (2015)

    Google Scholar 

  5. Yang, L., Han, J., Qi, Y., Liu, Y.: Identification-free batch authentication for RFID tags. In: Proceedings of the 18th Annual IEEE International Conference on Network Protocols, ICNP 2010, pp. 154–163. IEEE Computer Society (2010)

    Google Scholar 

  6. Gong, W., Liu, K., Miao, X., Ma, Q., Yang, Z., Liu, Y.: Informative counting: fine-grained batch authentication for large-scale RFID systems. In: Chockalingam, A., Manjunath, D., Franceschetti, M., Tassiulas, L., (eds.) The 14th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2013, pp. 21–30. ACM (2013)

    Google Scholar 

  7. Gong, W., Liu, Y., Nayak, A., Wang, C.: Wise counting: fast and efficient batch authentication for large-scale RFID systems. In: Wu, J., Cheng, X., Li, X., Sarkar, S., (eds.) The 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2014, pp. 347–356. ACM (2014)

    Google Scholar 

  8. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422–426 (1970)

    Article  MATH  Google Scholar 

  9. Liu, X., Qi, H., Li, K., Stojmenovic, I., Liu, A.X., Shen, Y., Qu, W., Xue, W.: Sampling bloom filter-based detection of unknown RFID tags. IEEE Trans. Commun. 63(4), 1432–1442 (2015)

    Article  Google Scholar 

  10. Kamaludin, H., Mahdin, H., Abawajy, J.H.: Filtering redundant data from RFID data streams. J. Sens. 2016, 7107914:1–7107914:7 (2016)

    Article  Google Scholar 

  11. Mitzenmacher, M.: Bloom filters. In: Encyclopedia of Database Systems, pp. 252–255 (2009)

    Google Scholar 

Download references

Acknowledgments

The paper was partially supported by the Polish National Science Center, based on the decision DEC-2013/08/M/ST6/00928, project HARMONIA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Łukasz Krzywiecki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Błaśkiewicz, P., Krzywiecki, Ł., Syga, P. (2016). RFID Tags Batch Authentication Revisited – Communication Overhead and Server Computational Complexity Limits. In: Bao, F., Chen, L., Deng, R., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2016. Lecture Notes in Computer Science(), vol 10060. Springer, Cham. https://doi.org/10.1007/978-3-319-49151-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49151-6_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49150-9

  • Online ISBN: 978-3-319-49151-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics