An aggregated signature-based fast RFID batch detection protocol

The wireless channels between tags and readers are not secure in Internet of Things. Before a reader processes packets from tags, the reader should detect the integrity of these packets. In existing research, these packets are detected by readers one by one. This process is time-consuming and impractical under some real-time scenarios. To decrease the detection time, we propose a fast radio-frequency identification batch detection protocol that is more suitable to detect whether the packets are modified by adversaries. The analysis and experimental results show that the proposed protocol has the following good properties: i it can detect the integrity of packets very fast; ii it has better performance in computational cost and storage cost of tags and servers; iii it can provide security protection in an efficient way. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Bo Sheng,et al.  How to Monitor for Missing RFID tags , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[2]  Yunhao Liu,et al.  ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.

[3]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[4]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[5]  Shigang Chen,et al.  Privacy-preserving RFID authentication based on cryptographical encoding , 2012, 2012 Proceedings IEEE INFOCOM.

[6]  Guojun Wang,et al.  A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder Theorem , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[7]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[8]  Tassos Dimitriou,et al.  A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[9]  Murali S. Kodialam,et al.  Anonymous Tracking Using RFID Tags , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[10]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[11]  Bo Sheng,et al.  Counting RFID Tags Efficiently and Anonymously , 2010, 2010 Proceedings IEEE INFOCOM.

[12]  Yong Guan,et al.  Lightweight Mutual Authentication and Ownership Transfer for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[13]  Yingjiu Li,et al.  Protecting RFID communications in supply chains , 2007, ASIACCS '07.

[14]  Yunhao Liu,et al.  Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[15]  Shiping Chen,et al.  Efficient missing tag detection in RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.

[16]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[17]  Yunhao Liu,et al.  Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[18]  Chin-Ling Chen,et al.  An Ownership Transfer Scheme Using Mobile RFIDs , 2013, Wirel. Pers. Commun..

[19]  Dan Suciu,et al.  Physical Access Control for Captured RFID Data , 2007, IEEE Pervasive Computing.

[20]  Fadhel M. Ghannouchi,et al.  Geometry-Based Doppler Analysis for GPS Receivers , 2013, Wirel. Pers. Commun..

[21]  Selwyn Piramuthu,et al.  Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols , 2009, 2009 First International Conference on Networks & Communications.

[22]  Yunhao Liu,et al.  Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.

[23]  Bo Sheng,et al.  Finding popular categories for RFID tags , 2008, MobiHoc '08.