One-Round Provably Secure Yoking-Proof for RFID Applications
Title | One-Round Provably Secure Yoking-Proof for RFID Applications |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Sun, D. Z., Xu, G. Q. |
Conference Name | 2017 IEEE Trustcom/BigDataSE/ICESS |
Date Published | Aug. 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5090-4906-6 |
Keywords | authentication, cryptography, data privacy, Human Behavior, human factors, Internet of Things, IoT, Moriyama security model, one-round offline yoking-proof scheme, one-round provably secure yoking-proof, privacy, privacy model, privacy protection, provable security, pubcrawl, radiofrequency identification, Resiliency, RFID, RFID applications, RFID tag pair, RFID tagged objects, RFID tags, RFIDs, Tools, yoking-proof |
Abstract | Under the Internet of Things (IoT), the coexistence proof of multiple RFID tagged objects becomes a very useful mechanism in many application areas such as health care, evidences in court, and stores. The yoking-proof scheme addresses this issue. However, all existing yoking-proof schemes require two or more rounds communication to generate the yoking-proof. In this paper, we investigate the design of one-round yoking-proof schemes. Our contributions are threefold: (1) to confirm the coexistence of the RFID tag pair, we propose a one-round offline yoking-proof scheme with privacy protection. (2) We define a privacy model of the yoking-proof scheme and enhance Moriyama's security model for the yoking-proof scheme. The security and the privacy of the proposed scheme are proved under our models. (3) We further extend the yoking-proof scheme for the coexistence of m RFID tags, where m\textbackslashtextgreater2. The extended scheme maintains one-round. In addition, the proposed technique has efficiency advantage, compared with previous work. |
URL | https://ieeexplore.ieee.org/document/8029456/ |
DOI | 10.1109/Trustcom/BigDataSE/ICESS.2017.253 |
Citation Key | sun_one-round_2017 |
- privacy protection
- yoking-proof
- tools
- RFIDs
- RFID tags
- RFID tagged objects
- RFID tag pair
- RFID applications
- RFID
- Resiliency
- radiofrequency identification
- pubcrawl
- provable security
- authentication
- privacy model
- privacy
- one-round provably secure yoking-proof
- one-round offline yoking-proof scheme
- Moriyama security model
- IoT
- Internet of Things
- Human Factors
- Human behavior
- data privacy
- Cryptography