Resilient RFID Grouping Proofs with Missing Tag Identification

Loading...
Thumbnail Image

Identifiers

Publication date

Reading date

Collaborators

Advisors

Tutors

Editors

Journal Title

Journal ISSN

Volume Title

Publisher

Springer

Metrics

Google Scholar

Share

Research Projects

Organizational Units

Journal Issue

Department/Institute

Abstract

The adoption of RFID (Radio Frequency Identification) technology has greatly improved the efficiency of inventory control, supply-chain management and logistics. With RFID group scanning, an RFID reader scans a group of RFID tagged objects to generate a grouping proof of “simultaneous” presence. Shipments may have to be tracked remotely by readers that are not necessarily trusted. In this paper we extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers. We present a two-pass anonymous grouping proof (of integrity) for the scanned objects of a (not necessarily complete) collection of RFID tagged objects that identifies missing objects. The proof is generated by an untrusted reader and can be checked by a verifier, a trusted entity. We only assume that RFID tags are able to generate pseudorandom numbers and compute one-way hash functions.

Description

Bibliographic citation

Resilient RFID Grouping Proofs with Missing Tag Identification. C.R. García et al. (Eds.): UCAmI 2016, Part II, LNCS 10070, pp. 544–555, 2016. DOI: 10.1007/978-3-319-48799-1 59

Endorsement

Review

Supplemented By

Referenced by