Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. / Yang, Anjia; Boshoff, Dutliff ; Hu, Qiao ; Hancke, Gerhard; Luo, Xizhao ; Weng, Jian ; Mayes, Keith; Markantonakis, Konstantinos.

In: IEEE Internet of Things Journal, 12.02.2021.

Research output: Contribution to journalArticlepeer-review

E-pub ahead of print

Standard

Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. / Yang, Anjia; Boshoff, Dutliff ; Hu, Qiao ; Hancke, Gerhard; Luo, Xizhao ; Weng, Jian ; Mayes, Keith; Markantonakis, Konstantinos.

In: IEEE Internet of Things Journal, 12.02.2021.

Research output: Contribution to journalArticlepeer-review

Harvard

APA

Yang, A., Boshoff, D., Hu, Q., Hancke, G., Luo, X., Weng, J., Mayes, K., & Markantonakis, K. (2021). Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2021.3059047

Vancouver

Yang A, Boshoff D, Hu Q, Hancke G, Luo X, Weng J et al. Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. IEEE Internet of Things Journal. 2021 Feb 12. https://doi.org/10.1109/JIOT.2021.3059047

Author

Yang, Anjia ; Boshoff, Dutliff ; Hu, Qiao ; Hancke, Gerhard ; Luo, Xizhao ; Weng, Jian ; Mayes, Keith ; Markantonakis, Konstantinos. / Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. In: IEEE Internet of Things Journal. 2021.

BibTeX

@article{6db1d03a891441488bbc9487d7f92b08,
title = "Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns",
abstract = "When authenticating a group of RFID tags, a common method is to authenticate each tag with some challenge-responseexchanges. However, sequentially authenticating individual tags one by one might not be desirable, especially when considering that areader often has to deal with multiple tags within a limited period, since it will incur long scanning time and heavy communication costs.To address these problems, we put forward a novel efficient group authentication protocol where a group of tags can be authenticatedsimultaneously with only one challenge and one response. The protocol is built on a new designed symmetric key based algorithm andthe bit-collision pattern technique, so that authentication responses transmitted by multiple tags in a group at the same time will resultin a verifiable bit-collision pattern that represents the authentication response for the entire group. The proposed approach cansignificantly reduce the authentication time and communication cost in sense that the verifier can authenticate the entire group within aperiod that is comparable to the time taken to perform a single tag authentication and requires only one challenge. In addition, weextend our protocol to support privacy-preserving property which prevents the tagged items from being tracked by illegitimate parties. Athorough security analysis shows that the proposed protocol can resist common practical attacks and experimental results show thatthe protocol is very efficient in terms of time and communication costs. We also discuss important practical aspects that should beconsidered when implementing these protocols.",
author = "Anjia Yang and Dutliff Boshoff and Qiao Hu and Gerhard Hancke and Xizhao Luo and Jian Weng and Keith Mayes and Konstantinos Markantonakis",
year = "2021",
month = feb,
day = "12",
doi = "10.1109/JIOT.2021.3059047",
language = "English",
journal = "IEEE Internet of Things Journal",
issn = "2327-4662",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

RIS

TY - JOUR

T1 - Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

AU - Yang, Anjia

AU - Boshoff, Dutliff

AU - Hu, Qiao

AU - Hancke, Gerhard

AU - Luo, Xizhao

AU - Weng, Jian

AU - Mayes, Keith

AU - Markantonakis, Konstantinos

PY - 2021/2/12

Y1 - 2021/2/12

N2 - When authenticating a group of RFID tags, a common method is to authenticate each tag with some challenge-responseexchanges. However, sequentially authenticating individual tags one by one might not be desirable, especially when considering that areader often has to deal with multiple tags within a limited period, since it will incur long scanning time and heavy communication costs.To address these problems, we put forward a novel efficient group authentication protocol where a group of tags can be authenticatedsimultaneously with only one challenge and one response. The protocol is built on a new designed symmetric key based algorithm andthe bit-collision pattern technique, so that authentication responses transmitted by multiple tags in a group at the same time will resultin a verifiable bit-collision pattern that represents the authentication response for the entire group. The proposed approach cansignificantly reduce the authentication time and communication cost in sense that the verifier can authenticate the entire group within aperiod that is comparable to the time taken to perform a single tag authentication and requires only one challenge. In addition, weextend our protocol to support privacy-preserving property which prevents the tagged items from being tracked by illegitimate parties. Athorough security analysis shows that the proposed protocol can resist common practical attacks and experimental results show thatthe protocol is very efficient in terms of time and communication costs. We also discuss important practical aspects that should beconsidered when implementing these protocols.

AB - When authenticating a group of RFID tags, a common method is to authenticate each tag with some challenge-responseexchanges. However, sequentially authenticating individual tags one by one might not be desirable, especially when considering that areader often has to deal with multiple tags within a limited period, since it will incur long scanning time and heavy communication costs.To address these problems, we put forward a novel efficient group authentication protocol where a group of tags can be authenticatedsimultaneously with only one challenge and one response. The protocol is built on a new designed symmetric key based algorithm andthe bit-collision pattern technique, so that authentication responses transmitted by multiple tags in a group at the same time will resultin a verifiable bit-collision pattern that represents the authentication response for the entire group. The proposed approach cansignificantly reduce the authentication time and communication cost in sense that the verifier can authenticate the entire group within aperiod that is comparable to the time taken to perform a single tag authentication and requires only one challenge. In addition, weextend our protocol to support privacy-preserving property which prevents the tagged items from being tracked by illegitimate parties. Athorough security analysis shows that the proposed protocol can resist common practical attacks and experimental results show thatthe protocol is very efficient in terms of time and communication costs. We also discuss important practical aspects that should beconsidered when implementing these protocols.

U2 - 10.1109/JIOT.2021.3059047

DO - 10.1109/JIOT.2021.3059047

M3 - Article

JO - IEEE Internet of Things Journal

JF - IEEE Internet of Things Journal

SN - 2327-4662

ER -