You are not logged in.

A robust grouping proof protocol for RFID EPC C1G2 tags

Sundaresan, Saravanan, Doss, Robin, Piramuthu, Selwyn and Zhou, Wanlei 2014, A robust grouping proof protocol for RFID EPC C1G2 tags, IEEE transactions on information forensics and security, vol. 9, no. 6, pp. 961-975, doi: 10.1109/TIFS.2014.2316338.

Attached Files
Name Description MIMEType Size Downloads

Title A robust grouping proof protocol for RFID EPC C1G2 tags
Author(s) Sundaresan, Saravanan
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Piramuthu, Selwyn
Zhou, WanleiORCID iD for Zhou, Wanlei orcid.org/0000-0002-1680-2521
Journal name IEEE transactions on information forensics and security
Volume number 9
Issue number 6
Start page 961
End page 975
Total pages 15
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2014
ISSN 1556-6013
Keyword(s) EPC C1G2 passive tags
grouping proof
RFID
security protocols
Science & Technology
Technology
Computer Science, Theory & Methods
Engineering, Electrical & Electronic
Computer Science
Engineering
PATIENT SAFETY
AUTHENTICATION
SECURITY
OWNERSHIP
GENERATOR
SYSTEMS
Summary Several grouping proof protocols for RFID systems have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with the EPC class-1 gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, simultaneity, dependence, detecting illegitimate tags, eliminating unwanted tag processing, and denial-of-proof attacks have not been fully addressed by many. Our protocol addresses these important gaps by taking a holistic approach to grouping proofs and provides forward security, which is an open research issue. The protocol is based on simple (XOR) encryption and 128-bit pseudorandom number generators, operations that can be easily implemented on low-cost passive tags. Thus, our protocol enables large-scale implementations and achieves EPC C1G2 compliance while meeting the security requirements.
Language eng
DOI 10.1109/TIFS.2014.2316338
Field of Research 080502 Mobile Technologies
080503 Networking and Communications
080504 Ubiquitous Computing
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2014, Institute of Electrical and Electronics Engineers Inc.
Persistent URL http://hdl.handle.net/10536/DRO/DU:30070746

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 9 times in TR Web of Science
Scopus Citation Count Cited 15 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 213 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Mon, 16 Mar 2015, 15:01:54 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.