Skip to main content

Advertisement

Springer Nature Link
Account
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. International Journal of Computational Intelligence Systems
  3. Article

A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

  • Research Article
  • Open access
  • Published: 01 September 2012
  • Volume 5, pages 824–833, (2012)
  • Cite this article

You have full access to this open access article

Download PDF
View saved research
International Journal of Computational Intelligence Systems Aims and scope Submit manuscript
A Forward-secure Grouping-proof Protocol for Multiple RFID Tags
Download PDF
  • Ya-li Liu1,2,
  • Xiao-lin Qin1,
  • Bo-han Li1 &
  • …
  • Liang Liu1 
  • 92 Accesses

  • 6 Citations

  • Explore all metrics

Abstract

Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI) with Secure Multiparty Communication (SMC), a Forward-Secure Grouping-Proof Protocol (FSGP) for multiple RFID tags based on Shamir’s (n, n) secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

Article PDF

Download to read the full article text

Similar content being viewed by others

A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications

Article 08 July 2017

Analysis and Design of Group RFID Tag Security Authentication Protocol

Chapter © 2020

Efficient group authentication in RFID using secret sharing scheme

Article 10 February 2018

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Mobile and Network Security
  • Principles and Models of Security
  • Public-Private Partnership
  • Security Services
  • Security Science and Technology
  • Blockchain

References

  1. A. Juels, Yokin g-proofs for RFID tags, in Proc. 2nd IEEE Annual Conference on PERCOMW’04 (IEEE Press 2004), pp. 138–143.

  2. J. Saito, K. Sak urai, Grouping proof for RFID tags, in Proc. 19th IEEE International Conference on AINA ‘05 (IEEE Press 2005), pp. 621–624.

    Google Scholar 

  3. S. Piramuthu, On existence proofs for multiple RFID tags, in Proc. IEEE International Conference on ICPS’06 (IEEE Press 2004), pp. 317–320.

    Google Scholar 

  4. L. Bolotnyy and G. Robins, Generalized yoking-proofs for a group of RFID tags, in Proc. 3rd Annual International Conference on MUS’06 (2006), pp. 1–4.

    Google Scholar 

  5. P. Peris-Lopez, J. C. He rnandez-Castro, Estevez-Tapiador J. M., and Ribagorda A., Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags, in Proc. 3rd International Workshop on SPTPUC’07 (2007), pp. 55–60.

    Google Scholar 

  6. M. Burmester, B. D. Medeiros and R. Motta, Provably Secure Grouping-Proofs for RFID Tags, in Proc. 8th International Conference on CARDIS’08(Springer-Verlag, LNCS 5189, 2008) , pp.176–190.

  7. C. C. Lin, Y. C. Lai, J. D. Tygar, C. K. Yang, and Chiang C. L., Coexistence proof using chain of timestamps for multiple RFID tags, in Proc. International Workshop on APWeb/WAIM’07(Springer-Verlag, LNCS 5189, 2007), pp.634–643.

    Google Scholar 

  8. Y. H. Lien, X.F.Leng,K. Mayes, and J. H. Chiu, Reading order independent grouping proof for RFID tags, in Proc. IEEE International Conference on ISI’08(IEEE Press 2004), pp. 128–136.

    Google Scholar 

  9. W. Pedrycz, A.V. Vasilakos, Computational intelligence in telecommunications networks (CRC Press, Boca Raton, FL, 2000) .

  10. A.V. Vasilakos, W. Pedrycz, Ambient Intelligence, Wireless Networking, Ubiquitous Computing (Art House, MA, USA, 2006).

    Google Scholar 

  11. A. Konar, Computational Intelligence: Principles, Techniques and applications(Springer-Verlag, New York, 2005).

    Google Scholar 

  12. G. K. Venayagamoorthy, A successful in terdisciplinary course on computational intelligence, IEEE Computational Intelligence Mag. 4(1) (2009) 14–23.

    Google Scholar 

  13. A. P. Engelbrecht, Computational Intelligence: An Introduction, 2nd edn. (NY, USA: John Wiley & Sons, 2007).

    Google Scholar 

  14. H. Y. Chien, S. B. Liu, Tree-Based RFID Yoking Proof, in Proc. International Conference on NSWCTC’09 (IEEE Press 2009), pp. 550–553.

    Google Scholar 

  15. H. Y. Chien, C. C. Yang, T. C. Wu, C. F. Lee, Two RFID-based Solutions to Enhance Inpatient Medication Safety, J. Med. Syst. 35(3) (2011) 369–375.

    Google Scholar 

  16. M. Burmester, O. Munilla, Lightweight RFID authentication with forward and backward security, ACM Transactions on Information and System Security (TISSEC). 14 (1) (2011) 11–37.

    Google Scholar 

  17. H. Lein, L. L. Chang, Strong (n, t, n) verifiable secret sharing scheme, Information Sciences. (180) (2010) 3059–3064.

    Google Scholar 

  18. G. R. Blakley, Safeguarding cryptographic keys, in Proc. AFIPS Conf. (NCC, Arlington, Va. 48, 1979), pp. 313–317.

    Google Scholar 

  19. A. Shamir, How to share a secret, Communications of the ACM. 22(11) (1979) 612–613.

    Google Scholar 

  20. P. Peris-Lopez,, J. C. Hernandez-Castro, Estevez-Tapiador J. M., and Ribagorda A., LAMED – A PRNG for EPC class-1 generation-2 RFID specification, Computer Standards and Interfaces. (31) (2009) 88–97. LIU Ya-li et al.

  21. EPCglobal Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9., Available from: http://www.EPCglobalinc.org/.

Download references

Author information

Authors and Affiliations

  1. College of Computer Science & Technology, Nanjing University of Aeronautics and Astronautics, 210016, Nanjing, China

    Ya-li Liu, Xiao-lin Qin, Bo-han Li & Liang Liu

  2. College of Computer Science & Technology, Jiangsu Normal University, 221116, Xuzhou, China

    Ya-li Liu

Authors
  1. Ya-li Liu
    View author publications

    Search author on:PubMed Google Scholar

  2. Xiao-lin Qin
    View author publications

    Search author on:PubMed Google Scholar

  3. Bo-han Li
    View author publications

    Search author on:PubMed Google Scholar

  4. Liang Liu
    View author publications

    Search author on:PubMed Google Scholar

Corresponding author

Correspondence to Xiao-lin Qin.

Rights and permissions

This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Reprints and permissions

About this article

Cite this article

Liu, Yl., Qin, Xl., Li, Bh. et al. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags. Int J Comput Intell Syst 5, 824–833 (2012). https://doi.org/10.1080/18756891.2012.733209

Download citation

  • Received: 01 November 2011

  • Accepted: 15 June 2012

  • Published: 01 September 2012

  • Issue date: September 2012

  • DOI: https://doi.org/10.1080/18756891.2012.733209

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • RFID
  • Grouping-proof
  • Forward-secure
  • Order-independent
  • Secret Sharing

Associated Content

Part of a collection:

Computational Intelligence for Network Control and Security

Advertisement

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

Not affiliated

Springer Nature

© 2026 Springer Nature