Browse > Article
http://dx.doi.org/10.5392/JKCA.2021.21.02.113

A Secure Yoking-Proof Protocol Providing Offline Verification  

Ham, Hyoungmin (배재대학교 사이버보안학과)
Publication Information
Abstract
RFID (Radio Frequency Identification) yoking authentication provides methods scanning a pair of RFID tags with a reader device and verifying them to ensure the physical proximity of objects. In the first yoking proof protocols, a verifier connected to a reader device online is essential to verify the yoking proof, and this condition limits the environment in which yoking proof can be applied. To solve this limitation, several studies have been conducted on offline yoking proof protocol that does not require the online connection between a reader and a verifier. However, the offline yoking proof protocols do not guarantee the basic requirements of yoking proof, and require relatively more operations on the tag compared to the previous yoking proof protocols. This paper proposes an efficient offline yoking proof protocol that supports offline verification without the need for an online verifier. The proposed protocol provides a secure yoking proof with fewer number of operations than the existing ones, and it also can be extended to the group proof for more than a pair of tags without additional devices. The analysis in this paper shows that the proposed protocol provides offline verification securely and effectively.
Keywords
RFID; Yoking-proof; Offline Yoking-proof; Tracking; Unlinkability; Privacy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Yang, Ming-Hour, Luo, Jia, Lu, Shao, "A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme," Sensors, Vol.15, No.10, MDPI, 2015.
2 Z. Shi, X. Zhang, and J. Liu, "The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security," Wireless Communications and Mobile Computing, Article ID 8436917, 2020.
3 Hong Liu, Huansheng Ning, Yinliang Yue, Yueliang Wan, and Laurence T. Yang, "Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices," Future Generation Computer Systems, Vol.78, Part.3, pp.976-986, 2018.   DOI
4 Wei Zhang, Shiming Qin, Shengming Wang, Longkai Wu, and Baolin Yi, "A New Scalable Lightweight Grouping Proof Protocol for RFID systems," Wireless Personal Communications, Vol.103, pp.133-143, 2018.   DOI
5 Z. Zhou, P. Liu, Q. Liu, and G. Wang, "An Anonymous Offline RFID Grouping-Proof Protocol," Future Internet, Vol.10, No.1, p.2, 2018.   DOI
6 K. Finkenzeller, "RFID Handbook, Fundamentals and Applications in Contactless Smart Cards and Identification," John Wiley and Sons Ltd,, pp.226-232, 2003.
7 S. Piramuthu, "On existence proofs for multiple RFID tags," Proceeding of ACS/IEEE International Conference on Pervasive Services, pp.317-320, 2005.
8 "EPCglobal class1 gen2 RFID specifications," Whitepaper, 2008
9 A. Juels, "Yoking proofs for RFID tags," Proceedings of the 2nd IEEE Annual Conference on Computing and Communication Workshops, pp.138-143, 2008.
10 J. Saito and K. Sakurai, "Grouping proof for RFID tags," Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Vol.2, pp.621-624, 2005.
11 L. Bolotnyy and G. Robins, "Generalized yoking proofs for a group of RFID tags," Proceeding of the 3rd International Conference on Mobile and Ubiquitous Systems Workshops, pp.1-4, 2006.
12 P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags," Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp.55-60, 2007.
13 P. Peris-Lopez, A. Orfila, J. C. Hernandez-Castro, Vander Lubbe, and C. A. Jan, "Flaws on RFID Grouping-Proofs," Guidelines for Future Sound, J. Netw. Comput. Appl, Vol.4, No.3, pp.833-845, 2011.
14 J. S. Cho, S. S. Yeo, S. C. Hwang, S. Y. Rhee, and S. K. Kim, "Enhanced yoking proof protocols for RFID tags and tag groups," Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops, WAINA'08, pp.1591-1596, 2008.
15 Y. Lien, X. Leng, K. Mayes, and J. Chiu, "Reading order independent grouping proof for RFID tags," Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp.128-136, IEEE, 2008.
16 M. Burmester, B. Medeiros, and R. Motta, "PrOFF-Vably secure grouping proofs for RFID tags," Proceedings of the 8th IFIP international conference on Smart Card Research and Advanced Applications, pp.176-190, Springer Verlag, Berlin, Heidelberg, 2008.