Data Verification in Integrated RFID Systems

Radio frequency identification (RFID) is widely used as a tagging system to facilitate physical transactions in the real world. Thanks to the availability of inexpensive passive RF tags, RFID technology is now the catalyst of Internet of Things, i.e., every object can be uniquely identified in an Internet-like way. In the future, many individual RFID systems are likely to be integrated into a few exascale RFID systems. In an integrated RFID system, service providers (SPs) that offer RFID-based data service and clients that use the data service are different organizations. As a consequence, quality of data in terms of authenticity is of significant concern. In this paper, we first formulate a data verification problem in RFID systems and build a model of integrated RFID systems where multiple SPs and clients exist. Then, we propose two data verification protocols to ensure data generated by SPs associated with a particular tag and has not been modified. In addition, we implement our system as a prototype. The computer simulations, analyses, and testbeds based on the prototype all demonstrate that the proposed verifiable integrated RFID system achieves a high level of security and performance.

[1]  Marianne Winslett,et al.  Regulatory-Compliant Data Management , 2007, VLDB.

[2]  Lei Hu,et al.  Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[3]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[4]  Hua Lu,et al.  An RFID and particle filter-based indoor spatial query evaluation system , 2013, EDBT '13.

[5]  Ngoc-Tu Nguyen,et al.  A dynamic-range-based algorithm for reader-tag collision avoidance deployment in RFID networks , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).

[6]  Marco Zuniga,et al.  On optimal tag placement for indoor localization , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.

[7]  Tadayoshi Kohno,et al.  RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications , 2008, CCS.

[8]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[9]  Kazuya Sakai,et al.  Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel , 2013, IEEE Transactions on Computers.

[10]  Ninghui Li,et al.  WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance , 2009, ESORICS.

[11]  N. Asokan,et al.  Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[12]  Satoshi Fukumoto,et al.  Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems , 2016, WASA.

[13]  Haixun Wang,et al.  A Bayesian Inference-Based Framework for RFID Data Cleansing , 2013, IEEE Transactions on Knowledge and Data Engineering.

[14]  Jan Camenisch,et al.  Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.

[15]  Dominique Schröder,et al.  Verifiable data streaming , 2012, CCS.

[16]  Athanasios V. Vasilakos,et al.  Private and Secure Tag Access for Large-Scale RFID Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[17]  Michael T. Goodrich,et al.  On the Cost of Persistence and Authentication in Skip Lists , 2007, WEA.

[18]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[19]  Hui-Mei Wang,et al.  Privacy-Preserving k-Nearest Neighbor Computation in Multiple Cloud Environments , 2016, IEEE Access.

[20]  Elisa Bertino,et al.  No one can track you: Randomized authentication in Vehicular Ad-hoc Networks , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[21]  Yevgeniy Vahlis,et al.  Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..

[22]  Roberto Tamassia,et al.  Authenticated hash tables , 2008, CCS.

[23]  Wei-Shinn Ku,et al.  A Novel Coding Scheme for Secure Communications in Distributed RFID Systems , 2016, IEEE Transactions on Computers.

[24]  Ngoc-Tu Nguyen,et al.  A Maximum-Weight-Independent-Set-Based Algorithm for Reader-Coverage Collision Avoidance Arrangement in RFID Networks , 2016, IEEE Sensors Journal.

[25]  Sheikh Iqbal Ahamed,et al.  AnonPri: A secure anonymous private authentication protocol for RFID systems , 2017, Inf. Sci..