Novel Designated Ownership Transfer with Grouping Proof
Abstract
:1. Introduction
2. Proposed Protocol
2.1. Initialization Phase
2.2. Integrity Verification Phase
2.3. Ownership Transfer Phase
3. Security Analysis
3.1. Replay Attack
3.2. Denial of Proof
3.3. Denial of Service
3.4. Forward Secrecy
3.5. Backward Secrecy
3.6. Concurrent Attacks
3.7. Message Integrity
4. Performance Analysis
5. GNY Logic Proof
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Leong, C.E. A Research on Supply Chain Security in Malaysia. Int. J. Supply Chain Manag. 2014, 3, 85–93. [Google Scholar]
- Juels, A. Yoking Proof for RFID Tags. In Proceedings of the 2nd Annual International Conference on Pervasive Computing and Communications, Orlando, FL, USA, 14–17 March 2004; pp. 138–143. [Google Scholar] [CrossRef]
- Saito, J.; Sakurai, K. Grouping Proof for RFID Tags. In Proceedings of the International Conference on Advanced Information Networking and Applications, Taipei County, Taiwan, 25–30 March 2005; pp. 621–624. [Google Scholar]
- Batina, L.; Lee, Y.K.; Seys, S.; Singelée, D.; Verbauwhede, E. Extending ECC-based RFID Authentication Protocols to Privacy-preserving Multi-party Grouping Proofs. Pers. Ubiquitous Comput. 2012, 16, 323–335. [Google Scholar] [CrossRef]
- Hermes, J.; Peeters, R. Private Yoking Proofs: Attacks, Models and New Provable Constructions. In Proceedings of the 8th International Conference on RFIDSec, Nijmegen, The Netherlands, 2–3 July 2012; pp. 96–108. [Google Scholar]
- Shen, J.; Tan, H.W.; Chang, S.H.; Ren, Y.J.; Liu, Q. A Lightweight and Practical RFID Grouping Authentication Protocol in Multiple-Tag Arrangements. In Proceedings of the International Conference on Advanced Communication Technology, Ho Chi Minh, Vietnam, 1–3 July 2015; pp. 681–686. [Google Scholar]
- Abughazalah, S.; Markantonakis, K.; Mayes, K. Two Rounds RFID Grouping Proof Protocol. In Proceedings of the IEEE International Conference on RFID, Orlando, FL, USA, 3–5 May 2016; pp. 1–14. [Google Scholar]
- Burmester, M.; Munilla, J. An Anonymous RFID Grouping Proof with Missing Tag Identification. In Proceedings of the IEEE International Conference on RFID, Orlando, FL, USA, 3–5 May 2016; pp. 1–7. [Google Scholar] [CrossRef]
- Burmester, M.; Munilla, J. Resilient Grouping Proof with Missing Tag Identification. In Proceedings of the International Conference on Ubiquitous Computing and Ambient Intelligence, Las Palmas de Gran Canaria, Spain, 29 November–2 December 2016; pp. 544–555. [Google Scholar]
- Rostampour, S.; Bagheri, N.; Hosseinzadeh, M.; Khademzadeh, A. An Authenticated Encryption Based Grouping Proof Protocol for RFID Systems. J. Secur. Commun. Netw. 2017, 9, 5581–5590. [Google Scholar] [CrossRef]
- Shi, Z.; Zhang, X.; Wang, Y. A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism. Information 2017, 8, 85. [Google Scholar]
- Huang, H.H.; Yeh, L.Y.; Tsaur, W.J. Ultra-Lightweight Mutual Authentication and Ownership Transfer Protocol with PUF for Gen2v2 RFID Systems. In Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong, China, 16–18 March 2016; Volume 2, pp. 655–658. [Google Scholar]
- Li, Q.S.; Xu, X.L.; Chen, Z. PUF-based RFID Ownership Transfer Protocol in an Open Environment. In Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies, Hong Kong, China, 9–11 December 2014; pp. 131–137. [Google Scholar]
- Li, G.C.; Xu, X.L.; Li, Q.S. LADP: A Lightweight Authentication and Delegation Protocol for RFID Tags. In Proceedings of the International Conference on Ubiquitous and Future Networks, Sapporo, Japan, 7–10 July 2015; pp. 860–865. [Google Scholar]
- Niu, H.F.; Jagannathan, S.; Taqieddin, E.S. A Gen2v2 Compliant RFID Authentication and Ownership Management Protocol. In Proceedings of the IEEE Conference on Local Computer Networks, Edmonton, AB, Canada, 8–11 September 2014; pp. 331–336. [Google Scholar]
- Sundaresan, S.; Doss, R.; Zhou, W.L.; Piramuthu, S. Secure Ownership Transfer for Multi-tag Multi-owner Passive RFID Environment with Individual-owner-privacy. Int. J. Comput. Telecommun. Ind. 2015, 55, 112–124. [Google Scholar] [CrossRef]
- Yang, M.H.; Xie, K.P. TTP-Based Group Ownership Transfer in A Mobile RFID Environment. Int. J. Digit. Content Technol. Its Appl. 2013, 7, 51–69. [Google Scholar]
- Munilla, J.; Burmester, M.; Peinado, A. Attacks on Ownership Transfer Scheme for Multi-tag Multi-owner Passive RFID Environments. Comput. Commun. 2016, 88, 84–88. [Google Scholar] [CrossRef]
- Kapoor, G.; Piramuthu, S. Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols. IEEE Commun. Lett. 2010, 14, 260–262. [Google Scholar] [CrossRef]
- Burmester, M.; Medeiros, B.; Motta, R. Provably Secure Grouping-proofs for RFID Tags. In Proceedings of the 8th Smart Card Research and Advanced Application Conference, London, UK, 8–11 September 2008. [Google Scholar] [CrossRef]
- Yu, Y.C.; Hou, T.W.; Chiang, T.C. Low Cost RFID Real Lightweight Binding Proof Protocol for Medication Errors and Patient Safety. J. Med. Syst. 2012, 36, 823–828. [Google Scholar] [CrossRef] [PubMed]
- Zuo, Y.J. Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags. In Proceedings of the Hawaii International Conference on System Sciences, Washington, DC, USA, 5–8 January 2010; pp. 1–10. [Google Scholar]
- Yang, M.H.; Luo, J.N.; Lu, S.Y. A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme. Sensors 2015, 15, 27087–27115. [Google Scholar] [CrossRef] [PubMed]
- Sun, H.M.; Ting, W.C.; Chang, S.Y. Offlined Simultaneous Grouping Proof Protocol for RFID EPC C1G2 Tags. In Proceedings of the 2nd International Conference on Computer Science and its Applications, Jeju, Korea, 7–9 October 2013; pp. 1–6. [Google Scholar]
- Yen, Y.C.; Lo, N.W.; Wu, T.C. Two RFID-Based Solutions for Secure Inpatient Medeciation Administration. J. Med. Syst. 2012, 36, 2769–2778. [Google Scholar] [CrossRef] [PubMed]
- Jannati, H.; Falahati, A. Cryptanaylsis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags. In Proceedings of the International Conference on Global Security, Safety and Sustainability, Thessaloniki, Greece, 24–26 August 2012; pp. 186–193. [Google Scholar]
- Gong, L.; Needham, R.; Yahalom, R. Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, FL, USA, 14–16 April 1990; pp. 234–248. [Google Scholar]
- Russell, D.M.; Saldanha, J.P. Five Tenents of Security-Aware Logistics and Supply Chain Operation. Transp. J. 2003, 44, 44–54. [Google Scholar]
Notation | Description |
---|---|
A | a transporter who delivers cargo |
a cargo shipment with a tag collection | |
the qth recipient who receives the cargo | |
an identification code for A | |
an identification code of the reader used by A | |
an identification code of | |
an identification code of the jth reader used by | |
an identification code of the ith tag for | |
a hash value for verifying | |
a secret key shared between and V | |
a secret key shared between and V | |
a secret key shared between and | |
a secret key shared between and V | |
a session key shared among readers | |
/ | a public/private key pair for a |
/ | a public/private key pair |
a random number generated by | |
a random number generated by | |
a random number generated by a | |
a random number generated by | |
a timestamp generated by V | |
an encryption function with two inputs: the message () and the symmetric key () | |
a signing function with two inputs and | |
a key-hashing function for generating message authentication codes, where the inputs are and | |
a hashing function with an input | |
a ownership transfer protocol |
Protocol | Replay Attack * (OT/GP) | Denial of Proof (GP) | Concurrency Attack (GP) | Denial of Service (OT) | Forward Secrecy (OT) | Backward Secrecy (OT) |
---|---|---|---|---|---|---|
Zuo [22] + Hermes and Peeters [5] | X | X | X | O | O | |
Zuo [22] + Saito and Sakurai [3] | X | X | X | O | O | |
Zuo [22] + Sun et al. [24] | X | Δ | X | O | O | |
Zuo [22] + Yen et al. [25] | Δ | O | X | O | O | |
Our Protocol | O | O | O | O | O |
Symbol | Description |
---|---|
computation time for conducting symmetric encryption and decryption | |
required time for generating a random number | |
computation time for executing a hash function | |
required time for conducting elliptic curve encryption and decryption | |
required time for proof signing | |
required time to compute a message authentication code | |
required time for encrypting and decrypting a group key | |
m | total tags |
r | maximum number of tags that a reader can scanned concurrently |
Schemes | Tag | Mobile Reader |
---|---|---|
Zuo [22] + Hermes and Peeters [5] | ||
Zuo [22] + Sun et al. [24] | ||
Zuo [22] + Yen et al. [25] | ||
Our Protocol |
Symbol | Estimated Length | Deription |
---|---|---|
64 bits | length of a tag identification code (based on ISO-18000-6) | |
64 bits | message length after applying symmetric encryption | |
64 bits | message length for a random number | |
64 bits | message length for a message authentication code | |
64 bits | message length of a hash function | |
192 bits | message length after applying elliptic curve encryption | |
1024 bits | represents the message length after performing group key encryption |
Schemes | From Tag to Reader | From Reader to Tag (or Reader) |
---|---|---|
Zuo [22] + Hermes and Peeters [5] | ||
Zuo [22] + Sun et al. [24] | ||
Zuo [22] + Yen et al. [25] | ||
Our Protocol |
Notation | Description |
---|---|
A | a transporter who delivers cargo |
a recipient who receives the cargo | |
the transporter’s reader | |
the recipient’s reader | |
the cargo’s tag | |
message X is encrypted/decrypted with symmetric key k | |
message X is encrypted using a public key or decrypted with a private key | |
P is told message X | |
P is told message X that is not-originated-here | |
P possess message X | |
P believes Q once conveyed message X | |
P believes X is fresh | |
P believes X is recognizable | |
P believes s is a suitable secret for P and Q | |
P believes that is a suitable public key for Q | |
P believes Q has jurisdiction over all his beliefs |
Transporter A | Recipient |
---|---|
Reader | Reader |
Verifier V | Tag |
First Goal | |
The recipient’s reader can authenticate all tags | |
, and the tags can recognize the received | |
message to generate pieces of proof . The pieces | |
of proof are later combined into a grouping | |
proof through the transporter’s reader and | |
then transmitted to the verifier V. | |
Second Goal | |
The recipient’s reader can authenticate all of | |
the tags and the tags can recognize the | |
received message, therefore it updates the shared key | |
. The recipient recognized the received | |
message from reader therefore updates the | |
shared key . | |
Proof | |
---|---|
Message 1: | |
Since the session key is generated using the | |
/*T1*/ | shared key between verifier V, |
/*P1*/ | believes that the messages come from . |
/*IA, I1, R2*/ | |
/*IA, I1, F2*/ | |
/*IA, F3*/ | |
Message 2: | |
Since the group key is generated by the | |
/*T1*/ | verifier V, believes that the messages |
/*P1*/ | come from . Once the is identified, |
/*IA, I2, R2*/ | a fresh random number will be generated |
/*R5*/ | to compute the proof and piece of the message |
/*IA, I2, F2*/ | verification code to ensure message is fresh, |
/*IA*/ | not replayed and has not been tampered with. |
/*IA, F10*/ | |
Message 3: | |
Message verification code is verified to ensure | |
/*T1*/ | the message from tag has not beeen tampered with. |
/*P1*/ | |
/*IA, I6, R5*/ | |
/*I6, F1*/ | |
/*IA*/ | |
/*IA, F2*/ | |
Message 4: | |
Message verification code is verified to | |
/*T1*/ | ensure the message has not been tampered with and is |
/*P1*/ | identified to ensure that the message comes from . |
/* IA, I1, R2*/ | |
/*IA, I1, R2*/ | |
/*IA, I2, F2*/ | |
/*IA*/ | |
/*IA, F10*/ | |
Message 5: | |
The transporter A generates a random number | |
/*T1*/ | to ensure the message is fresh and uses |
/*P1*/ | private key to sign the grouping proof as |
/*IA */ | a proof of participation. |
/*IA, F4*/ | |
Message 6: | |
Reader receives the signed grouping proof. | |
/*T1*/ | |
/*P1*/ | |
Message 7: | |
The recipient generates a random number | |
/*T1*/ | to ensure the message is fresh and uses private |
/*P1*/ | key to sign the grouping proof as a proof |
/*IA */ | of participation. |
/*IA, F4*/ | |
Message 8: | |
Reader receives the final grouping proof . | |
/*T1*/ | |
/*P1*/ | |
Verifier V will verify the correctness of the final | |
/*T1*/ | proof and identify whether the proof is |
/*P1*/ | generated under the time threshold. If there is no |
/*IA, I4, F4*/ | issue with the proof, the verifier V will proceed |
/*IA, I4, F4*/ | to the ownership transfer phase. |
/*IA, I1, R5*/ | |
Message 9: | |
Verifier V generates to ensure the message is | |
fresh, i.e. not replayed. | |
/*T1*/ | |
/*P1*/ | |
/*IA, I1, R2*/ | |
/*IA, I1, F2*/ | |
/*IA, F3*/ | |
Message 10: | |
is identified to ensure that message comes | |
/*T1*/ | from . |
/*P1*/ | |
/*IA */ | |
/*I2, R2*/ | |
/*J1*/ | |
Message 11: | |
Since the session key is generated using the | |
shared key between verifier V, | |
/*T1*/ | that the messages come from |
/*P1*/ | |
/*IA, I1, R2*/ | |
/*IA, I1, F2*/ | |
/*IA, F3*/ | |
Message 12: | |
Since the session key is generated using the | |
shared key between verifier V, | |
/*T1*/ | believes that the messages come from . |
/*P1*/ | |
/*IA, I1, R2*/ | |
/*IA, I1, F2*/ | |
/*IA, F3*/ | |
Message 13: | |
Since the group key is generated by the | |
/*T1*/ | verifier V, believes that the messages |
/*P1*/ | come from . |
/*IA, I2, R2*/ | |
/*IA, I2, R2*/ | |
/*IA, I2, F2*/ | |
/*J1*/ |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tsai, K.-Y.; Yang, M.H.; Luo, J.N.; Liew, W.-T. Novel Designated Ownership Transfer with Grouping Proof. Appl. Sci. 2019, 9, 724. https://doi.org/10.3390/app9040724
Tsai K-Y, Yang MH, Luo JN, Liew W-T. Novel Designated Ownership Transfer with Grouping Proof. Applied Sciences. 2019; 9(4):724. https://doi.org/10.3390/app9040724
Chicago/Turabian StyleTsai, Kuo-Yu, Ming Hour Yang, Jia Ning Luo, and Wei-Tim Liew. 2019. "Novel Designated Ownership Transfer with Grouping Proof" Applied Sciences 9, no. 4: 724. https://doi.org/10.3390/app9040724
APA StyleTsai, K. -Y., Yang, M. H., Luo, J. N., & Liew, W. -T. (2019). Novel Designated Ownership Transfer with Grouping Proof. Applied Sciences, 9(4), 724. https://doi.org/10.3390/app9040724