# A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

^{*}

## Abstract

**:**

## 1. Introduction

## 2. The Related Grouping-Proof Protocols for RFID Systems

## 3. The RFID System Under Grouping Proof and Its Secure Model

## 4. The Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

## 5. The Efficient and Secure Analysis of the Proposed Protocol

## 6. Conclusions

## Acknowledgments

## Author Contributions

## Conflicts of Interest

## References

- Juels, A. RFID Security and Privacy: A Research Survey. IEEE J. Sel. Areas Commun.
**2006**, 24, 381–394. [Google Scholar] [CrossRef] - Juels, A. Yoking-Proofs for RFID Tags. In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Orlando, FL, USA, 14–17 March 2004; pp. 138–143. [Google Scholar]
- Burmester, M.; Medeiros, B.; Motta, R. Provably Secure Grouping-Proofs for RFID Tags. In Proceedings of the 8th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications-CARDIS’08, London, UK, 8–11 September 2008; pp. 176–190. [Google Scholar]
- Peris-Lopez, P.; Orfila, A.; Hernandez-Castro, J.C.; van der Lubbe, J.A. Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Netw. Comput. Appl.
**2011**, 34, 833–845. [Google Scholar] [CrossRef] [Green Version] - Lo, N.-W.; Yeh, K.-H. Anonymous Coexistence Proofs for RFID Tags. J. Inf. Sci. Eng.
**2010**, 26, 1213–1230. [Google Scholar] - Satio, J.; Sakurai, K. Grouping Proof for RFID Tags. In Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, 25–30 March 2005; Volume 2, pp. 621–624. [Google Scholar]
- Huang, H.-H.; Ku, C.-Y. An RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst.
**2009**, 33, 467–474. [Google Scholar] [CrossRef] [PubMed] - Chien, H.Y.; Yang, C.C.; Wu, T.C.; Lee, C.F. Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst.
**2011**, 35, 369–375. [Google Scholar] [CrossRef] [PubMed] - Peris-Lopez, P.; Orfila, A.; Mitrokotsa, A.; van der Lubbe, J.C. A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Med. Inform.
**2011**, 80, 13–24. [Google Scholar] [CrossRef] [PubMed] [Green Version] - Yen, Y.-C.; Lo, N.-W.; Wu, T.-C. Two RFID-Based Solutions for Secure Inpatient Medication Administration. J. Med. Syst.
**2012**, 36, 2769–2778. [Google Scholar] [CrossRef] [PubMed] - Liu, H.; Zhang, Y.; Xiong, Q.X. Grouping-proofs-based authentication protocols for distributed RFID systems. IEEE Trans. Parallel Distrib. Syst.
**2013**, 24, 1321–1330. [Google Scholar] [CrossRef] - Shen, J.; Tan, H.W.; Wang, Y. An enhanced grouping proof for multiple RFID readers and tag groups. Int. J. Control Autom.
**2014**, 7, 239–246. [Google Scholar] [CrossRef] - Moriyama, D. Provably Secure Two-Round RFID Grouping Proof Protocols. In Proceedings of the 2014 IEEE RFID Technology and Applications (RFID-TA) Conference, Tampere, Finland, 8–9 September 2014; pp. 272–276. [Google Scholar]
- Huang, P.; Mu, H.B. A high-security RFID Grouping Proof protocol. Int. J. Secur. Appl.
**2015**, 9, 35–44. [Google Scholar] [CrossRef] - Shen, J.; Tan, H.W.; Ren, Y.J.; Liu, Q.; Wang, D.W. A Practical FRID Grouping Authentication Protocol in Multiple-tag Arrangement with Adequate Security Assurance. ICACT Trans. Adv. Commun. Technol.
**2015**, 4, 693–699. [Google Scholar] - Yuan, B.Q.; Liu, J.Q. A Universally Composable Secure Grouping-proof Protocol for RFID Tags. Concurr. Comput.
**2016**, 28, 1872–1883. [Google Scholar] [CrossRef] - Kang, H.Y. Analysis and improvement of ECC-based Grouping-proof protocol for RFID. Int. J. Control Autom.
**2016**, 9, 343–352. [Google Scholar] - Batina, L.; Lee, Y.K.; Seys, S.; Singele, D.; Verbauwhede, I. Privacy-preserving ECC-based grouping proofs for RFID. In Proceedings of the 13th International Conference on Information Security, Boca Raton, FL, USA, 25–28 October 2010; Springer: Berlin, Germany, 2011; Volume 6531, pp. 159–165. [Google Scholar]

**Figure 2.**(

**a**) The diagram of our proposed protocol under passive mode; (

**b**) The diagram of our proposed protocol under passive mode.

Notation | Description |
---|---|

gid | the identifier of a tag group |

tkj | The secret key of the jth tag |

rki | the secret key of the ith reader |

ridi | the identifier of the ith reader |

Hash ( ) | a secure cryptographic Hash function |

PRNG () | a pseudorandom number generator |

r1, r2, r3, r4 | some random numbers generated by the different entities |

t | the timestamp of the verifier |

t1 | The timer which the reader starts |

⊕ | bitwise XOR operation |

© 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).

## Share and Cite

**MDPI and ACS Style**

Shi, Z.; Zhang, X.; Wang, Y.
A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism. *Information* **2017**, *8*, 85.
https://doi.org/10.3390/info8030085

**AMA Style**

Shi Z, Zhang X, Wang Y.
A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism. *Information*. 2017; 8(3):85.
https://doi.org/10.3390/info8030085

**Chicago/Turabian Style**

Shi, Zhicai, Xiaomei Zhang, and Yihan Wang.
2017. "A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism" *Information* 8, no. 3: 85.
https://doi.org/10.3390/info8030085