Title: Select-response grouping proof and its verification protocol for RFID tags

Authors: Yuan-Hung Lien, Xuefei Leng, Keith E. Mayes, Jung-Hui Chiu

Addresses: Department of Electronic Engineering, National Taiwan University of Science and Technology, No. 43, Sec. 4, Keelung Rd., Taipei, 106, Taiwan. ' Smart Card Centre, Information Security Group, Royal Holloway, University of London, TW20 0ER, UK. ' Smart Card Centre, Information Security Group, Royal Holloway, University of London, TW20 0ER, UK. ' Department of Electrical Engineering, Chang Gung University, No. 259, Wen-Hwa 1st Road, Kwei-Shan, Tao-Yuan, 333, Taiwan

Abstract: In this paper, we investigate an application scenario in which the user requires a proof that a group of radio frequency identification (RFID) tags are scanned simultaneously by reading devices. Such a proof is generally called a grouping proof. After examining the existing |yoking proof| grouping protocols used for RFIDs, an improved protocol called the |select-response| grouping proof is proposed. Instead of passively awaiting the responses from RFID tags as used in existing protocols, the proposed protocol uses a new mechanism whereby the reader/verifier actively sends commands to each tag, asking for a response and then generating the grouping proof. After this fundamental change, the verification process is simple and flexible. In addition, the proposed protocol can perform multi-group verification and it also possesses collision-free, missing tag identification, and reading order independent properties. Moreover, the proposed protocol protects the mutual authentication from clandestine scanning and replay attacks, and hence, the overall security is improved.

Keywords: radio frequency identification; RFID tags; yoking proof; security; collision free; grouping proof; select response; missing tag identification; reading order independence; mutual authentication; multi-group verification; clandestine scanning; replay attacks.

DOI: 10.1504/IJIIDS.2011.038967

International Journal of Intelligent Information and Database Systems, 2011 Vol.5 No.2, pp.101 - 118

Received: 29 Nov 2009
Accepted: 14 May 2010

Published online: 21 Oct 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article