RFID tags - Grouping proof with forward security

Author(s):  
Saravanan Sundaresan ◽  
Robin Doss ◽  
Wanlei Zhou
Author(s):  
Yuan Hung Lien ◽  
Xuefei Leng ◽  
Keith E. Mayes ◽  
Jung Hui Chiu
Keyword(s):  

Author(s):  
Xuefei Leng ◽  
Yuanhung Lien ◽  
Keith Mayes ◽  
Konstantinos Markantonakis ◽  
Jung-Hui Chiu
Keyword(s):  

2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
Ming-Hour Yang ◽  
Jia-Ning Luo

We propose a grouping proof scheme to help the nursing staff on their final check automatically before a medicine round. During the medicine round, even though their RFID reader is offline, our method can generate multiple proofs for each patient and help the medical caretakers follow the five-right policy to correctly administer the drugs to their patients. Besides, because our scheme enables a nurse to target specific group tags during a medicine round, it is able to generate proofs even when the illegitimate tags are on site. We prove that our generated proof is reliable because it can resist most security threats and guarantee the integrity of the proof. Besides, our proposed scheme guarantees anonymity on the RFID tags, so the patients’ sensitive information and location privacy can be protected. Last, we run a simulation to show that compared with the related methods our proposed scheme requires the least transmission time and the lowest computation loads to generate a proof.


2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
Zhicai Shi ◽  
Xiaomei Zhang ◽  
Jin Liu

In many fields, multiple RFID tags are often combined into a group to identify an object. An RFID grouping-proof protocol is utilized to prove the simultaneous existence of a group of tags. However, many current grouping-proof protocols cannot simultaneously provide privacy preserving, forward security, and the authentication between reader/verifier and tags, which are vulnerable to trace attack, privacy leakage, and desynchronization attack. To improve the secure performance of the current grouping-proof protocols, we propose two provable lightweight grouping-proof protocols that provide forward security, identity authentication, and privacy preserving. Our protocols involve a trusted reader and an untrusted reader, respectively. In order to avoid verifying some invalid evidences, our protocols complete the authentication of the verifier to the trusted reader and the verified tags before the verifier verifies the grouping-proof evidence. Each tag uses parallel mode to complete its signature to improve the efficiency of the protocols. Moreover, the activate-sleep mechanism and the filtering operation are proposed to effectively reduce the collision probability and computing load of tags. Our protocols complete the authentication to tags twice by a verifier and a trusted reader, respectively. They can resist various attacks such as eavesdropping, replay, trace, and desynchronization. The protocols are proven to be secure, flexible, and efficient. They only utilize some lightweight operations. Therefore, they are very suitable to the low-cost RFID systems.


Sign in / Sign up

Export Citation Format

Share Document