Deakin University
Browse

File(s) under permanent embargo

A robust grouping proof protocol for RFID EPC C1G2 tags

journal contribution
posted on 2014-01-01, 00:00 authored by Saravanan Sundaresan, Robin Ram Mohan DossRobin Ram Mohan Doss, S Piramuthu, Wanlei Zhou
Several grouping proof protocols for RFID systems have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with the EPC class-1 gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, simultaneity, dependence, detecting illegitimate tags, eliminating unwanted tag processing, and denial-of-proof attacks have not been fully addressed by many. Our protocol addresses these important gaps by taking a holistic approach to grouping proofs and provides forward security, which is an open research issue. The protocol is based on simple (XOR) encryption and 128-bit pseudorandom number generators, operations that can be easily implemented on low-cost passive tags. Thus, our protocol enables large-scale implementations and achieves EPC C1G2 compliance while meeting the security requirements. © 2005-2012 IEEE.

History

Journal

IEEE transactions on information forensics and security

Volume

9

Issue

6

Pagination

961 - 975

Publisher

IEEE

Location

Piscataway, N.J.

ISSN

1556-6013

Language

eng

Publication classification

C Journal article; C1 Refereed article in a scholarly journal

Copyright notice

2014, Institute of Electrical and Electronics Engineers Inc.