| Literature DB >> 26512673 |
Ming Hour Yang1, Jia Ning Luo2, Shao Yong Lu3.
Abstract
To minimize cargo theft during transport, mobile radio frequency identification (RFID) grouping proof methods are generally employed to ensure the integrity of entire cargo loads. However, conventional grouping proofs cannot simultaneously generate grouping proofs for a specific group of RFID tags. The most serious problem of these methods is that nonexistent tags are included in the grouping proofs because of the considerable amount of time it takes to scan a high number of tags. Thus, applying grouping proof methods in the current logistics industry is difficult. To solve this problem, this paper proposes a method for generating multilayered offline grouping proofs. The proposed method provides tag anonymity; moreover, resolving disputes between recipients and transporters over the integrity of cargo deliveries can be expedited by generating grouping proofs and automatically authenticating the consistency between the receipt proof and pick proof. The proposed method can also protect against replay attacks, multi-session attacks, and concurrency attacks. Finally, experimental results verify that, compared with other methods for generating grouping proofs, the proposed method can efficiently generate offline grouping proofs involving several parties in a supply chain using mobile RFID.Entities:
Keywords: anonymity; concurrency attacks; multi-session attacks; multilayered grouping proof; radio-frequency identification; supply chain management
Year: 2015 PMID: 26512673 PMCID: PMC4634462 DOI: 10.3390/s151027087
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Process of supply chain distribution and grouping proof: (a) steps of the supply chain distribution; (b) generate the grouping proofs for pick up and delivery; (c) generate the grouping proofs for cargo delivery.
Figure 2Group Key tree of cargo tags of recipient : (a) Rule for numbering among group keys; (b) key tree for 3-ary group tags.
Definition of symbols.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| Identification code for
|
|
| Identification code of a trusted and active third-party
|
|
| Identification code of the reader used by
|
|
| Identification code of
|
|
| Identification code of the
|
|
| Identification code of the
|
|
| |
|
| Verification hash value for
|
|
| Shared key for
|
|
| Shared key for
|
|
| Shared key for
|
|
| Shared key for
|
|
| Session key among readers |
|
| Public key for
|
|
| Private key for
|
|
| Public key for
|
|
| Private key for
|
|
| Random number generated by
|
|
| Random number generated by
|
|
| Random number generated by
|
|
| Random number generated by
|
|
| Random number generated by
|
|
| Timestamp generated by
|
|
| System time of
|
|
| Time threshold for generating grouping proofs |
|
| Encryption function generated by message ( |
|
| Signing function generated by
|
|
| Function for message authentication code generated by
|
|
| Message authentication code generated from an employment of hash function by
|
|
| Judgement of whether the grouping proof for
|
Figure 3Examples showing group key selection in an incomplete group Tree: (a) the number of remaining tags reading capacity of tags; (b) .
Figure 4Read Tree with the reading capacity of six tags: (a) A single group key; (b) several group keys.
Figure 5Signed timestamp acquired from trustworthy clock tag.
Figure 6Generating grouping proofs by multilayered reader.
Figure 7Affirm the tags and proofs signed by both sides and verify the time constraint.
Comparison table indicating the security of grouping proof.
| Protocol | Replay Attack | Tag Impersonation | Multi-Session Attack | Concurrency Attack | Denial of Proof |
|---|---|---|---|---|---|
| Burmester | O | O | O | X | ∆2 |
| Saito | X | X | O | X | X |
| Lin | O | O | O | O | X |
| Sun | O | O | O | ∆1 | X |
| Hermans | O | O | O | X | X |
| Lo | O | O | O | O | X |
| Ma | O | O | O | O | X |
| Chien | O | O | O | X | X |
| Peris-Lopez | O | O | O | O | X |
| Piramuthu [ | O | O | X | X | X |
| Sundaresan | O | O | O | O | O |
| Yen | O | O | O | O | ∆2 |
| Leng | O | O | O | X | X |
| Huang | O | X | O | X | X |
| OMRGP | O | O | O | O | O |
Note: ∆1: Not overwriting the proofs from different readers; but the random numbers generated by proofs may still be overwritten; ∆2: Filters proofs that do not belong to a group of tags, but cannot prevent a denial of proof attack because of the compromised proof integrity.
Comparison of grouping proof performance.
| Protocol | Anonymity | Tracking Attack | Offline | Order Independent | Simultaneity |
|---|---|---|---|---|---|
| Burmester | O | O | O | X | ∆4 |
| Saito | O | ∆3 | X | X | X |
| Lin | X | X | O | X | X |
| Sun | O | O | O | O | O |
| Hermans | O | O | O | O | O |
| Lo | O | O | O | X | X |
| Ma | O | O | O | X | X |
| Chien | O | ∆3 | X | X | X |
| Peris-Lopez | O | O | X | X | X |
| Piramuthu [ | X | X | X | X | X |
| Sundaresan | O | O | O | X | X |
| Yen | O | O | X | O | O |
| Leng | X | X | X | O | X |
| Huang | X | X | O | X | X |
| OMRGP | O | O | O | O | O |
Note: ∆3: Single message that features anonymity; however, relevance among tags with messages from different sessions can be used to track tag movement; ∆4: Only parts of the tags in the group can concurrently compute pieces of proof.
Computational capacity of grouping proof tags (with m number of tags).
| Name of the Method | Cargo Tag | Mobile Reader |
|---|---|---|
| Sun |
|
|
| Hermans |
|
|
| Yen |
|
|
| Leng |
|
|
| OMRGP |
|
|
Figure 8Comparing the computational load of the tags.
Figure 9Comparing the computational load of readers.
Transmission capacity of m grouping proof tags.
| Name of the Method | From Tag to Reader | From Reader to Tag (or Reader) |
|---|---|---|
| Sun |
|
|
| Hermans |
|
|
| Yen |
|
|
| Leng |
|
|
| OMRGP |
|
|
Figure 10Comparing the message quantity of the collected tags.
Figure 11Comparing the message quantity transmitted by the reader.
Figure 12Comparing the time for generating grouping proofs.