DOI QR코드

DOI QR Code

A Tag Proximity Information Acquisition Scheme for RFID Yoking Proof

RFID 요킹증명을 위한 인접태그 정보 획득 기법

  • 함형민 (배재대학교 사이버보안학과)
  • Received : 2019.08.01
  • Accepted : 2019.08.25
  • Published : 2019.09.28

Abstract

RFID yoking proof proves that a pair of tags is scanned at the same time. Since the tags scanned simultaneously by a single reader are adjacent to each other, the yoking proof is used in applications that need to check the physical proximity of tagged objects. Most of the yoking proof schemes require pre-knowledge on adjacent tags. If an error occurs in the process of collecting information about adjacent tags, all subsequent proofs will fail verification. However, there is no research that suggests specific methods for obtaining information about adjacent tags. In this study, I propose a tag proximity information acquisition scheme for a yoking proof. The proposed method consists of two steps: scanning area determination and scanning area verification. In the first step, the size and position of the area to scan tags is determined in consideration of position and transmission range of the tags. In the next step, whether tag scanning is performed within the scanning area or not is verified through reference tags of the fixed position. In analysis, I show that the determined scanning area assures acquisition of adjacent tag information and the scanning area verification detects deformation and deviation of the scanning area.

RFID 요킹증명은 한 쌍의 태그가 동시에 스캔 되었는지를 증명한다. 단일 리더에 의해 동시에 스캔 된 태그들은 서로 인접해 있기 때문에, 요킹증명은 태그가 부착된 객체들의 물리적 인접성을 검사해야 하는 응용에서 사용된다. 현재까지 제안된 대부분의 요킹증명 기법들은 인접한 태그에 관한 사전정보가 필수적이다. 만약 인접한 태그에 관한 정보를 수집하는 과정에서 오류가 발생하면, 이후의 증명들은 모두 검증에 실패하게 된다. 그러나 현재까지 인접한 태그에 관한 정보를 얻기 위한 구체적인 방법을 제시한 연구는 아직 없다. 이 연구에서 나는 요킹증명 기법을 위한 인접태그 정보 획득 기법인 TPIA을 제안한다. 제안기법은 스캐닝영역 결정과 스캐닝영역 검증의 두 단계로 구성된다. 스캐닝영역 결정 단계에서는 태그들의 위치와 전송범위를 고려하여 태그들을 스캔할 영역의 크기와 위치를 결정하며, 스캐닝영역 검증 단계에서는 고정된 위치의 참조태그를 사용하여 태그 스캐닝이 스캐닝영역 안에서 수행되었는지 여부를 검증한다. 나는 분석에서 제안하는 스캐닝영역이 정상적인 인접태그 정보의 획득을 보장하며, 스캐닝영역 검증이 스캐닝영역의 변형과 이탈을 감지하는 것을 보인다.

Keywords

References

  1. A. Juels, "Yoking proofs for RFID tags," Proceedings of the 2nd IEEE Annual Conference on Computing and Communication Workshops, pp.138-143, 2008.
  2. J. Saito and K. Sakurai, "Grouping proof for RFID tags," Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Vol.2, pp.621-624, 2005.
  3. S. Piramuthu, "On existence proofs for multiple RFID tags," Proceeding of ACS/IEEE International Conference on Pervasive Services, pp.317-320, 2005.
  4. L. Bolotnyy and G. Robins, "Generalized yoking proofs for a group of RFID tags," Proceeding of the 3rd International Conference on Mobile and Ubiquitous Systems Workshops, pp.1-4, 2006.
  5. P. Peris Lopez, J. C. Hernandez Castro, J. M. Estevez Tapiador, and A. Ribagorda, "Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags," Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp.55-60, 2007.
  6. J. S. Cho, S. S. Yeo, S. C. Hwang, S. Y. Rhee, and S. K. Kim, "Enhanced yoking proof protocols for RFID tags and tag groups," Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops, WAINA08, pp.1591-1596, 2008.
  7. Y. Lien, X. Leng, K. Mayes, and J. Chiu, "Reading order independent grouping proof for RFID tags," Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp.128-136, IEEE, 2008.
  8. D. Trcek, "Wireless sensors grouping proofs for medical care and ambient assisted-living deployment," Sensors, Vol.16, No.1, pp.33, 2016. https://doi.org/10.3390/s16010033
  9. M. Burmester, B. Medeiros, and R. Motta, "Provably secure grouping proofs for RFID tags," Proceedings of the 8th IFIP international conference on Smart Card Research and Advanced Applications, pp.176-190, Springer Verlag, Berlin, Heidelberg, 2008.
  10. N. Lo and K. Yeh, "Anonymous coexistence proofs for RFID tags," J. Inf. Syst. Edu. Vol.26, No.4, pp.1213-1230, 2010.
  11. P. Peris Lopez, A. Orfila, J. C. Hernandez Castro, Van der Lubbe, and C. A. Jan, "Flaws on RFID grouping-proofs: Guidelines for future sound," J. Netw. Comput. Appl. Vol.34, No.3, pp.833-845, 2011. https://doi.org/10.1016/j.jnca.2010.04.008
  12. C. Ma, J. Lin, Y. Wang, and M. Shang, "Offline RFID grouping proofs with trusted timestamps," Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.674-681, 2012.
  13. C. L. Chen, C. Y. Wu, F. Y. Leu, and Y. L. Huang, "Using RFID yoking proof to design a supply-chain applications for customs check," IT CoNvergence PRActice (INPRA), Vol.1, No.2, pp.34-53, 2013.
  14. M. H. Yang, J. N. Luo, and Y. Lu, "A novel multi-layered RFID tagged cargo integrity assurance scheme," Sensors, Vol.15, No.10, pp.27087-27115, 2015. https://doi.org/10.3390/s151027087
  15. S. Cheng, V. Varadharajan, Y. Mu, and W. Susilo, "An efficient and provably secure RFID grouping proof protocol," In Proceedings of the Australasian Computer Science Week Multiconference (ACSW '17), pp.1-7, 2017.
  16. S. Rostampour, N. Bagheri, M. Hosseinzadeh, and A. Khademzadeh, "An authenticated encryption based grouping proof protocol for RFID systems," Security and Communication Networks, Vol.9, No.18, pp.5581-5590, 2017. https://doi.org/10.1002/sec.1718
  17. Z. Zhou, P. Liu, Q. Liu, and G. Wang, "An anonymous offline RFID grouping-proof protocol," Future Internet, Vol.10, No.1, pp.1-15, 2018. https://doi.org/10.3390/fi10010001