A novel hash-based RFID grouping authentication protocol on tag groups and multiple readers

Jian Shen, Haowen Tan, Yongjun Ren, Yuhui Zheng, Jin Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Recently, several grouping protocols have been proposed to manage RFID authentication process in the occasion of identifying large numbers of passive tags simultaneously, which is a relatively hot topic in market promotion. In these protocols, however, the identifiers of tags are unsafely transmitted, which is vulnerable to privacy information leakage through eavesdropping. On the other hand, these protocols suffer from tracking problem. In this paper, we propose a novel hash-based grouping authentication protocol on tag groups and multiple readers. In our design, the RFID system is capable of identifying specific tag groups according to real requirements. The messages transmitted between RFID entities are under protection to avoid tracking and eavesdropping. We present two types of verifying methods for the backend processing system (BPS). In addition, mutual authentication is available between the BPS and reader or the reader and tags. The security analysis shows that our protocol is resistant to various attacks and achieves wide compliance to low-cost passive tags.

Original languageEnglish
Title of host publicationIntelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014
EditorsWilliam Cheng-Chung Chu, Stephen Jenn-Hwa Yang, Han-Chieh Chao
PublisherIOS Press
Number of pages10
ISBN (Electronic)9781614994831
Publication statusPublished - 2015
Externally publishedYes
EventInternational Computer Symposium, ICS 2014 - Taichung, Taiwan, Province of China
Duration: Dec 12 2014Dec 14 2014

Publication series

NameFrontiers in Artificial Intelligence and Applications
ISSN (Print)0922-6389


ConferenceInternational Computer Symposium, ICS 2014
Country/TerritoryTaiwan, Province of China

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence


Dive into the research topics of 'A novel hash-based RFID grouping authentication protocol on tag groups and multiple readers'. Together they form a unique fingerprint.

Cite this