For RFID will replace bar code, and will be used everywhere.


RFID Security Laboratory

School of Information Systems (SIS)


Singapore Management University (SMU)

Room 80 04 050
80 Stamford Road
Singapore 178902

Phone:

+65-6828-0913


Fax:

+65-6828-0919


Email:


Announcements:

http://ecx.images-amazon.com/images/I/41ZqbVgr0dL.jpg

New Book Coauthored (Morgan & Claypool 2013)

 

Yingjiu Li, Robert H. Deng, Elisa Bertino: RFID Security and Privacy. 158 pages, ISBN-13: 978-1627053259, Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, December 2013. [purchase hardcopy at Amazon] [purchase softcopy at M&C]

 

RFID Workshops Chaired

 

Yingjiu Li serves as a general co-chair for the Workshop on RFID and IoT Security (RFIDsec Asia) in 2013. He serves on the steering committee for Workshop on RFID Security (RFIDsec and RFIDsec Asia) since 2009. He also serves as program committee co-chair for the Workshop on RFID Security (RFIDsec Asia) in 2010, 2012, 2014.

 

Robert Deng serves as general co-chair for the Workshop on RFID and IoT Security in 2012, 2014.

 

Tieyan Li serves as program committee co-chair for the Workshop on RFID Security (RFIDsec Asia) in 2011.

 


Adopting RFID technology is an emerging trend in industry as it enables product information to be collected, shared, and managed in real time. However, the RFID technology has also triggered significant security concerns as industry espionage may eavesdrop on wireless RFID communications and launch active attacks. To address the security concerns in RFID applications, we created the RFID Security Lab on August 1, 2008. Since then, we have been conducting comprehensive research on RFID system security, including

 

Mechanisms for joint work: collaborate in RFID security and privacy research; provide industry requirements and participate in user testing for the development of practical RFID information platforms.

 

Mechanisms for financial & resource support: Resources for supporting research engineers; resources for equipment.


Team members:

 

Research grants:

 

Talks/demos/presentations (with link to slides):

 

 

 

Publications:

 

2015

1.      Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang: Universally Composable RFID Mutual Authentication. Accepted by IEEE Transactions on Dependable and Secure Computing (TDSC), 2015.

 

2014

1.      Kuo-Hui Yeh, Nai-Wei Lo, Kuo-Yu Tsai, Yingjiu Li, Enrico Winata: A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration, Wireless Personal Communications, 77(3): 1775-1800, Springer, 2014.

2.      Gaurang Torvekar, Yingjiu Li: AnonEPC - Making the Querying User Anonymous in EPCglobal Network. 2014 IEEE RFID Technology and Applications Conference (RFID-TA), pages 289-294, Tampere, Finland, September 8-9, 2014.

3.      Jie Shi, Su Mon Kywe, Yingjiu Li: Batch Clone Detection for RFID-enabled Supply Chain. The 8th Annual IEEE International Conference on RFID (IEEE RFID 2014), pages 154-161, Orlando, Florida, USA, April 8-10, 2014 (acceptance ratio 24%).

 

2013 

  1. Yingjiu Li, Robert H. Deng, Elisa Bertino: RFID Security and Privacy. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, 2013.
  2. Kevin Chiew, Yingjiu Li, Congfu Xu: On RFID False Authentications. Book chapter in Big Data and Internet of Things: A Roadmap for Smart Environments, pages 91-110, edited by N. Bessis and C. Dobre, Springer, 2013.
  3. Qiang Yan, Yingjiu Li, Robert Deng: Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network. Advanced Security and Privacy for RFID Technologies, edited by Ali Miri, pages 153-175, IGI Global, 2013.
  4. Jie Shi, Yingjiu Li, Robert Deng, Wei He, Eng Wah Lee: A Secure Platform for Information Sharing in EPCglobal Network. International Journal of RFID Security and Cryptography (IJRFIDSC), 2(1-4), 107-118, 2013.
  5. Su Mon Kywe, Yingjiu Li, Jie Shi: Attack and Defense Mechanisms of Malicious EPC Event Injection in EPC Discovery Service. 2013 IEEE International Conference on RFID Technologies and Applications (IEEE RFID TA), Johor Bahru, Malaysia, September 4-5, 2013.

 

2012 

  1. Jie Shi, Yingjiu Li, Robert Deng, Kevin Chiew: Design and Implementation of a Secure Prototype for EPCglobal Network Services. The 2012 Workshop on RFID and IoT Security (RFIDsec Asia), pages 45-56, Taipei, Taiwan, November 8-9, 2012.
  2. Jie Shi, Yingjiu Li, Robert Deng: A Secure and Efficient Discovery Service System in EPCglobal Network. Computers and Security, 31(8), 870-885, Elsevier, November 2012.
  3. Shaoying Cai, Robert Deng, Yingjiu Li, Yunlei Zhao: A New Framework for Privacy of RFID Path Authentication. The 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), pages 473-488, Singapore, June 26-29, 2012 (acceptance ratio 33/192=17.2%).
  4. Jie Shi, Yingjiu Li, Wei He, Darren Sim: SecTTS: A Secure Track & Trace System for RFID-Enabled Supply Chains. Computers in Industry 63 (2012), 574-585, Elsevier, 2012.
  5. Kuo-Hui Yeh, N.W. Lo, Yingjiu Li, Yung-Chun Chen, Tzong-Chen Wu: New Findings on RFID Authentication Schemes against De-synchronization Attack. International Journal of Innovative Computing Information and Control (IJICIC), 8(7A), 4431-4449, ICIC International, 2012.
  6. Shaoying Cai, Yingjiu Li, Yunlei Zhao: Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. The 27th IFIP International Information Security and Privacy Conference (SEC), pages 501-512, Heraklion, Crete, Greece, June 4-6, 2012 (acceptance ratio 42/167 = 25.1%).
  7. Hongbing Wang, Yingjiu Li, Zongyang Zhang, Zhenfu Cao: Two-level Path Authentication in EPCglobal Network. The 6th Annual IEEE International Conference on RFID (IEEE RFID), pages 24-31, Orlando, Florida, April 3-5, 2012 (acceptance ratio 25%).
  8. Qiang Yan, Yingjiu Li, Robert Deng: Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain Systems (invited paper). International Journal of RFID Security and Cryptography (IJRFIDSC), 1(1/2), 25-35, Informatics Society, 2012.
  9. Jie Shi, Darren Sim, Yingjiu Li, Robert Deng: SecDS: A Secure EPC Discovery Services System in EPCglobal Network (short paper). The 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), pages 267-274, San Antonio, TX, USA, February 7-9, 2012 (acceptance ratio 29/113 = 25.7%).
  10. Su Mon Kywe, Jie Shi, Yingjiu Li, Raghuwanshi Kailash: Evaluation of Different Electronic Product Code Discovery Service Models. Advances in Internet of Things (AIT), 2(2), 37-46, Scientific Research Publishing, 2012.
  11. Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou: A Survey on Privacy Frameworks for RFID Authentication (invited paper). IEICE Transactions 95-D(1): 2-11 (2012).

 

2011

  1. Tieyan Li, Yingjiu Li, Guilin Wang: Secure and Practical Key Distribution for RFID-Enabled Supply Chains. The 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), London, UK, September 7-9, 2011 (acceptance ratio 23/95=24.2%).
  2. Robert Deng, Yingjiu Li, Moti Yung, Yunlei Zhao: A Zero-Knowledge Based Framework for RFID Privacy. Journal of Computer Security (JCS), 19(6), 1109-1146, IOS, 2011.
  3. Yingjiu Li, Robert Deng, Junzuo Lai, Changshe Ma: On Two RFID Privacy Notions and Their Relations. ACM Transactions on Information and System Security (TISSEC), 14(4), 30:1-23, ACM, 2011.
  4. Yung-Chun Chen, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li and Enrico Winata: Adaptive Collision Resolution for Efficient RFID Tag Identification.  EURASIP Journal on Wireless Communications and Networking, 2011.
  5. Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li: Cryptanalysis of Hsiang-Shih’s Authentication Scheme for Multi-Server Architecture. International Journal of Communication Systems (IJCS), 24(7): 829-836, Wiley, 2011.
  6. Wei He, Yingjiu Li, Kevin Chiew, Tieyan Li, Eng Wah Lee: A Solution with Security Concern for RFID-Based Track and Trace Services in EPCglobal-Enabled Supply Chains. Book chapter in Designing and Deploying RFID Applications, pages 95-108, edited by Cristina Turcu, Intech, ISBN 978-953-307-265-4, June 2011.
  7. Ge Fu, Yingjiu Li: A Role-Based Authorization Framework for RFID-Enabled Supply Chain Networks. SDPS 2011 Conference — The 16th International Conference on Transformative Science, Engineering, and Business Innovation, Jeju Island, South Korea, June 12-16, 2011.
  8. Chunhua Su, Yingjiu Li, Robert Deng: RFID Mutual Authentication Protocols with Universally Composable Security. RFIDsec 2011 Asia, pages 35-49, Wuxi, China, April 6-8, 2011.
  9. Kevin Chiew, Yingjiu Li, Tieyan Li, Robert Deng: On False Authentications for C1G2 Passive RFID Tags. RFIDsec 2011 Asia, pages 50-65, Wuxi, China, April 6-8, 2011.

 

2010

  1. Shaoying Cai, Chunhua Su, Yingjiu Li, Robert Deng, Tieyan Li: Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains. The 6th International Conference on Information Systems Security (ICISS 2010), pages 246-260, Gandhinagar Gujarat, India, 15-19 December 2010 (acceptance ratio14/51=27.5%).
  2. Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li, Yi-Xiang Hung: Two Robust Remote User Authentication Protocols Using Smart Cards. Journal of Systems and Software (JSS), 83(2010): 2556-2565, Elsevier, 2010.
  3. Kevin Chiew, Yingjiu Li, Tieyan Li, Robert Deng, Manfred Aigner: Time Cost Evaluation for Executing RFID Authentication Protocols, Internet of Things 2010 Conference (IOT), Tokyo, Nov 29-Dec 1, 2010 (acceptance ratio 28/104=26.9%).
  4. Robert Deng, Yingjiu Li, Moti Yung, Yunlei Zhao: A New Framework for RFID Privacy. The 15th European Symposium on Research in Computer Security (ESORICS), pages 1-18, Athens, Greece, September 20-22, 2010 (acceptance ratio 42/201=20.8%).
  5. Qiang Yan, Robert Deng, Ivy Zheng, Yingjiu Li, Tieyan Li: Pseudonym-based RFID Discovery Service to Mitigate Unauthorized Tracking in Supply Chain Management. The 2nd International Symposium on Data, Privacy and E-Commerce (ISDPE), Buffalo/Niagara Falls, September 13-14, 2010.
  6. Junzuo Lai, Robert H. Deng, Yingjiu Li: Revisiting Unpredictability-Based RFID Privacy Models. The 8th International Conference on Applied Cryptography and Network Security (ACNS), pages 475-492, Beijing, China, June 22-25 2010 (acceptance ratio 33/178 =18.5%).
  7. Shaoying Cai, Yingjiu Li, Tieyan Li, Robert Deng, Haixia Yao: Achieving High Security and Efficiency in RFID-Tagged Supply Chains. International Journal of Applied Cryptography (IJACT), 2(1): 3-12, 2010.
  8. Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. E. Tapiador, Tieyan Li, Yingjiu Li: Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer. Computer Networks 54(9): 1502-1508, Elsevier, 2010.
  9. Kuo-Hui Yeh, N.W. Lo, Yingjiu Li, Enrico Winata: An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification. The 6th IEEE International Workshop on Heterogeneous Wireless Networks (AINA Workshop), pages 335-338, Perth, Australia, April 20-23, 2010.

 

2009

  1. Changshe Ma, Yingjiu Li, Robert Deng, Tieyan Li: RFID Privacy: Relation Between Two Notions, Minimal Condition, and Efficient Construction. The 16th ACM Conference on Computer and Communications Security (CCS 2009), pages 54-65, Chicago, US, November 9-13, 2009 (acceptance ratio 58/315 = 18.4%).
  2. Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert Deng: On Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. The 5th International Conference on Information Systems Security (ICISS), pages 71-85, Kolkata, India, December 14-18, 2009. (acceptance ratio 18/91=19.8%).
  3. Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert Deng: Flexible and Secure Secret Updating for Unidirectional Key Distribution in RFID-enabled Supply Chains. The 11th International Conference on Information and Communications Security (ICICS), pages 150-164, Beijing, China, December 14-17, 2009. (acceptance ratio 31/164 = 18.9%)
  4. Shaoying Cai, Tieyan Li, Yingjiu Li, Robert Deng: Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. The 5th Information Security Practice and Experience Conference (ISPEC 2009), pages 372-383, LNCS 5451, Xi'an, China, April 13-15, 2009. (acceptance ratio 36/160 = 22.5%)
  5. Shaoying Cai, Yingjiu Li, Tieyan Li, Robert Deng: Attacks and improvements to an RFID mutual authentication protocol (short paper). The 2nd ACM Conference on Wireless Network Security (WiSec' 09), pages 51-58, Zurich, Switzerland, March 16-18, 2009. (acceptance ratio 28/107 = 26.2%)
  6. Qiang Yan, Yingjiu Li, Tieyan Li, Robert Deng: A comprehensive study for RFID malwares on mobile devices. The 5th Workshop on RFID Security (RFIDsec 2009 Asia), Taipei, Taiwan, January 9- 11, 2009.
  7. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan Estevez-Tapiador, Tieyan Li, Yingjiu Li: Vulnerability analysis of RFID protocols for tag ownership transfer. The 5th Workshop on RFID Security (RFIDsec 2009 Asia), Taipei, Taiwan, January 9- 11, 2009.

 

2008

  1. Tong-Lee Lim, Tieyan Li, Yingjiu Li: A Security and Performance Evaluation of Hash-based RFID Protocols. The 4th International Conferences on Information Security and Cryptology (Inscrypt), pages 406-424, LNCS 5487, Beijing, December 14-17, 2008 (acceptance ratio 32/183=17.5%).

 

2007 

  1. Yingjiu Li, Xuhua Ding: Protecting RFID Communications in Supply Chains. ACM Symposium on InformAtion, Computer, and Communication Security (ASIACCS’07), pages 234-241, Singapore, March 20-22, 2007 (acceptance ratio 33/188 = 17.6%).

 

Technical disclosures:

 

Conference organization and journal editorship:

 

 

 

Visitors:

 

 

 

Equipment:

 

RFID Readers:
3 A828 readers, brand and manufacturer: CAEN, model: A828
1 A528 reader, brand and manufacturer: CAEN, model: A528
2 SR112 readers, brand and manufacturer: SmartID, model: SR112 (I2R assets)
4 SR113 readers, brand and manufacturer: SmartID, model: SR113

RFID Tags:
6 tags, brand and model: IAIK UHF demotag, manufacturer: IAIK, Technical Univ, Graz, Austria.

(currently purchasing 4 UHF demotags with ATxMega controller and ECDSA software module)

2 EPC IS and DS servers (currently purchasing 2 laptop PCs)

 

 

Memorable moments:


Last updated: December 2013.