Reference Hub3
RFID Grouping-Proofs

RFID Grouping-Proofs

Mike Burmester, Jorge Munilla
ISBN13: 9781466619906|ISBN10: 1466619902|EISBN13: 9781466619913
DOI: 10.4018/978-1-4666-1990-6.ch004
Cite Chapter Cite Chapter

MLA

Burmester, Mike, and Jorge Munilla. "RFID Grouping-Proofs." Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID, edited by Pedro Peris Lopez, et al., IGI Global, 2013, pp. 89-119. https://doi.org/10.4018/978-1-4666-1990-6.ch004

APA

Burmester, M. & Munilla, J. (2013). RFID Grouping-Proofs. In P. Lopez, J. Hernandez-Castro, & T. Li (Eds.), Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID (pp. 89-119). IGI Global. https://doi.org/10.4018/978-1-4666-1990-6.ch004

Chicago

Burmester, Mike, and Jorge Munilla. "RFID Grouping-Proofs." In Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID, edited by Pedro Peris Lopez, Julio C. Hernandez-Castro, and Tieyan Li, 89-119. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-1990-6.ch004

Export Reference

Mendeley
Favorite

Abstract

Radio Frequency Identification (RFID) is a challenging wireless technology with a great potential for supporting supply and inventory management. In this chapter the authors consider a particular application in which a group of tagged items are scanned to generate a record of simultaneous presence called a grouping-proof. Grouping-proofs can be used, for instance, to guarantee that drugs are shipped (or dispensed) accompanied by their corresponding information leaflets, to couple the user’s electronic passport with his/her bags, to recognize the presence of groups of individuals and/or equipment and more generally to support the security of supply and inventory systems. Although it is straightforward to design solutions when the verifier is online since it is sufficient for individual tags to authenticate themselves to the verifier, interesting security engineering challenges arise when the trusted server (or verifier) is not online during the scan activity. So, the field of grouping-proofs is very active, and many works have been published so far. This chapter details the setting for RFID grouping-proofs and discuss the threat model for such applications. The authors analyze some of the grouping-proofs proposed in the literature describing their advantages and disadvantages. Then, general guidelines for designing secure grouping-proofs are proposed. Finally, some examples of grouping-proofs that are provably secure in a strong security framework are presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.