Scalable Grouping-proof Protocol for RFID Tags
نویسندگان
چکیده
In this paper, we propose a grouping-proof protocol for RFID tags based on (n, n)-secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud attack (sometimes called distance fraud) which is a simple relay attack suggested by Desmedt. Any locationbased protocol including RFID protocols is vulnerable to this attack even if cryptographic technique is deployed. One practical countermeasure against mafia fraud attack is to integrate a distance-bounding protocol into a location-based protocol. However, Chandran et al. pointed out that forging geographic location of devices cannot be theoretically prevented. Therefore, we need to take this fact into account in order to make sense about security notion for secure grouping-proof protocols.
منابع مشابه
Cryptanalysis of a Scalable Grouping-proof Protocol for RFID Tags
The design of secure grouping-proof protocol is imperative to the pervasive deployment of low-cost RFIDs, though many protocols have been published recently. In this paper, we analyze the security vulnerabilities of a scalable grouping-proof protocol for RFID tags based on Shamir’s (n, n) secret sharing proposed by Dang and Kwangjo in 2009. This protocol attempts to alleviate many security weak...
متن کاملGrouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction
In this paper, we propose a grouping-proof protocol for RFID tags based on secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud atttack. Mafia fra...
متن کاملAn Anonymous Offline RFID Grouping-Proof Protocol
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security risk exists in the communication between the reader and tags. How to ensure the tag’s information security and to generate reliable grouping-pro...
متن کاملA Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism
A Radio Frequency Identification (RFID) grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some flaws such as low grouping-proof efficiency, being vulnerable to trace attack and information leakage. To improve the secure performance and effic...
متن کاملA Forward-secure Grouping-proof Protocol for Multiple RFID Tags
Designing secure and robust gr ouping-proof protocols based o n RFID characte ristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocol s recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009