IoT Security and Privacy

 

Summary of research on RFID security and privacy

Summary of research on secure EPC discovery services in EPCglobal network

 

Publications:

 

2019

  1. Pamela Hui Ting Chua, Yingjiu Li, Wei He: Adopting Hyperledger Fabric Blockchain for EPCglobal Network. Accepted by the 13th Annual International Conference on RFID (IEEE RFID), Phoenix, AZ, April 2-4, 2019.

 

2018

1.      Hui Cui, Robert H. Deng, Joseph K. Liu, Xun Yi, Yingjiu Li: Server-Aided Attribute-Based Signature with Revocation for Resource-Constrained Industrial-Internet-of-Things Devices. IEEE Transactions on Industrial Informatics (IND INFORM), 14(8): 3724-3732, 2018.

2.      Kai Bu, Yingjiu Li: Every Step You Take, I'll Be Watching You: Practical StepAuth-entication of RFID Paths. IEEE Transactions on Information Forensics and Security (TIFS), 13(4): 834-849, 2018 (accepted in 2017).

 

2016

1.      Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao: Efficient Tag Path Authentication Protocol with Less Tag Memory. The 12th International Conference on Information Security Practice and Experience (ISPEC), pages 255-270, Zhangjiajie, China, November 16-18, 2016.

 

2015

1.      Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang: Universally Composable RFID Mutual Authentication. IEEE Transactions on Dependable and Secure Computing (TDSC), 14(1): 83-94, 2017 (accepted in 2015).

 

2014

  1. Kuo-Hui Yeh, Nai-Wei Lo, Kuo-Yu Tsai, Yingjiu Li, Enrico Winata: A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration, Wireless Personal Communications, 77(3): 1775-1800, Springer, 2014.

2.      Gaurang Torvekar, Yingjiu Li: AnonEPC - Making the Querying User Anonymous in EPCglobal Network. 2014 IEEE RFID Technology and Applications Conference (RFID-TA), pages 289-294, Tampere, Finland, September 8-9, 2014.

3.      Jie Shi, Su Mon Kywe, Yingjiu Li: Batch Clone Detection for RFID-enabled Supply Chain. The 8th Annual IEEE International Conference on RFID (IEEE RFID 2014), pages 154-161, Orlando, Florida, USA, April 8-10, 2014 (acceptance ratio 24%).

 

2013 

  1. Yingjiu Li, Robert H. Deng, Elisa Bertino: RFID Security and Privacy. 158 pages, ISBN-13: 978-1627053259, Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, 2013.
  2. Kevin Chiew, Yingjiu Li, Congfu Xu: On RFID False Authentications. Book chapter in Big Data and Internet of Things: A Roadmap for Smart Environments, pages 91-110, edited by N. Bessis and C. Dobre, Springer, 2013.
  3. Qiang Yan, Yingjiu Li, Robert Deng: Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network. Advanced Security and Privacy for RFID Technologies, edited by Ali Miri, pages 153-175, IGI Global, 2013.
  4. Jie Shi, Yingjiu Li, Robert Deng, Wei He, Eng Wah Lee: A Secure Platform for Information Sharing in EPCglobal Network. International Journal of RFID Security and Cryptography (IJRFIDSC), 2(1-4), 107-118, 2013.
  5. Su Mon Kywe, Yingjiu Li, Jie Shi: Attack and Defense Mechanisms of Malicious EPC Event Injection in EPC Discovery Service. 2013 IEEE International Conference on RFID Technologies and Applications (IEEE RFID TA), Johor Bahru, Malaysia, September 4-5, 2013.

 

2012 

  1. Jie Shi, Yingjiu Li, Robert Deng, Kevin Chiew: Design and Implementation of a Secure Prototype for EPCglobal Network Services. The 2012 Workshop on RFID and IoT Security (RFIDsec Asia), pages 45-56, Taipei, Taiwan, November 8-9, 2012.
  2. Jie Shi, Yingjiu Li, Robert Deng: A Secure and Efficient Discovery Service System in EPCglobal Network. Computers and Security, 31(8), 870-885, Elsevier, November 2012.
  3. Shaoying Cai, Robert Deng, Yingjiu Li, Yunlei Zhao: A New Framework for Privacy of RFID Path Authentication. The 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), pages 473-488, Singapore, June 26-29, 2012 (acceptance ratio 33/192=17.2%).
  4. Jie Shi, Yingjiu Li, Wei He, Darren Sim: SecTTS: A Secure Track & Trace System for RFID-Enabled Supply Chains. Computers in Industry 63 (2012), 574-585, Elsevier, 2012.
  5. Kuo-Hui Yeh, N.W. Lo, Yingjiu Li, Yung-Chun Chen, Tzong-Chen Wu: New Findings on RFID Authentication Schemes against De-synchronization Attack. International Journal of Innovative Computing Information and Control (IJICIC), 8(7A), 4431-4449, ICIC International, 2012.
  6. Shaoying Cai, Yingjiu Li, Yunlei Zhao: Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. The 27th IFIP International Information Security and Privacy Conference (SEC), pages 501-512, Heraklion, Crete, Greece, June 4-6, 2012 (acceptance ratio 42/167 = 25.1%).
  7. Hongbing Wang, Yingjiu Li, Zongyang Zhang, Zhenfu Cao: Two-level Path Authentication in EPCglobal Network. The 6th Annual IEEE International Conference on RFID (IEEE RFID), pages 24-31, Orlando, Florida, April 3-5, 2012 (acceptance ratio 25%).
  8. Qiang Yan, Yingjiu Li, Robert Deng: Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain Systems (invited paper). International Journal of RFID Security and Cryptography (IJRFIDSC), 1(1/2), 25-35, Informatics Society, 2012.
  9. Jie Shi, Darren Sim, Yingjiu Li, Robert Deng: SecDS: A Secure EPC Discovery Services System in EPCglobal Network (short paper). The 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), pages 267-274, San Antonio, TX, USA, February 7-9, 2012 (acceptance ratio 29/113 = 25.7%).
  10. Su Mon Kywe, Jie Shi, Yingjiu Li, Raghuwanshi Kailash: Evaluation of Different Electronic Product Code Discovery Service Models. Advances in Internet of Things (AIT), 2(2), 37-46, Scientific Research Publishing, 2012.
  11. Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou: A Survey on Privacy Frameworks for RFID Authentication (invited paper). IEICE Transactions 95-D(1): 2-11 (2012).

 

2011

  1. Tieyan Li, Yingjiu Li, Guilin Wang: Secure and Practical Key Distribution for RFID-Enabled Supply Chains. The 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), London, UK, September 7-9, 2011 (acceptance ratio 23/95=24.2%).
  2. Robert Deng, Yingjiu Li, Moti Yung, Yunlei Zhao: A Zero-Knowledge Based Framework for RFID Privacy. Journal of Computer Security (JCS), 19(6), 1109-1146, IOS, 2011.
  3. Yingjiu Li, Robert Deng, Junzuo Lai, Changshe Ma: On Two RFID Privacy Notions and Their Relations. ACM Transactions on Information and System Security (TISSEC), 14(4), 30:1-23, ACM, 2011.
  4. Yung-Chun Chen, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li and Enrico Winata: Adaptive Collision Resolution for Efficient RFID Tag Identification.  EURASIP Journal on Wireless Communications and Networking, 2011.
  5. Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li: Cryptanalysis of Hsiang-Shih’s Authentication Scheme for Multi-Server Architecture. International Journal of Communication Systems (IJCS), 24(7): 829-836, Wiley, 2011.
  6. Wei He, Yingjiu Li, Kevin Chiew, Tieyan Li, Eng Wah Lee: A Solution with Security Concern for RFID-Based Track and Trace Services in EPCglobal-Enabled Supply Chains. Book chapter in Designing and Deploying RFID Applications, pages 95-108, edited by Cristina Turcu, Intech, ISBN 978-953-307-265-4, June 2011.
  7. Ge Fu, Yingjiu Li: A Role-Based Authorization Framework for RFID-Enabled Supply Chain Networks. SDPS 2011 Conference — The 16th International Conference on Transformative Science, Engineering, and Business Innovation, Jeju Island, South Korea, June 12-16, 2011.
  8. Chunhua Su, Yingjiu Li, Robert Deng: RFID Mutual Authentication Protocols with Universally Composable Security. RFIDsec 2011 Asia, pages 35-49, Wuxi, China, April 6-8, 2011.
  9. Kevin Chiew, Yingjiu Li, Tieyan Li, Robert Deng: On False Authentications for C1G2 Passive RFID Tags. RFIDsec 2011 Asia, pages 50-65, Wuxi, China, April 6-8, 2011.

 

2010

  1. Shaoying Cai, Chunhua Su, Yingjiu Li, Robert Deng, Tieyan Li: Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains. The 6th International Conference on Information Systems Security (ICISS 2010), pages 246-260, Gandhinagar Gujarat, India, 15-19 December 2010 (acceptance ratio14/51=27.5%).
  2. Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li, Yi-Xiang Hung: Two Robust Remote User Authentication Protocols Using Smart Cards. Journal of Systems and Software (JSS), 83(2010): 2556-2565, Elsevier, 2010.
  3. Kevin Chiew, Yingjiu Li, Tieyan Li, Robert Deng, Manfred Aigner: Time Cost Evaluation for Executing RFID Authentication Protocols, Internet of Things 2010 Conference (IOT), Tokyo, Nov 29-Dec 1, 2010 (acceptance ratio 28/104=26.9%).
  4. Robert Deng, Yingjiu Li, Moti Yung, Yunlei Zhao: A New Framework for RFID Privacy. The 15th European Symposium on Research in Computer Security (ESORICS), pages 1-18, Athens, Greece, September 20-22, 2010 (acceptance ratio 42/201=20.8%).
  5. Qiang Yan, Robert Deng, Ivy Zheng, Yingjiu Li, Tieyan Li: Pseudonym-based RFID Discovery Service to Mitigate Unauthorized Tracking in Supply Chain Management. The 2nd International Symposium on Data, Privacy and E-Commerce (ISDPE), Buffalo/Niagara Falls, September 13-14, 2010.
  6. Junzuo Lai, Robert H. Deng, Yingjiu Li: Revisiting Unpredictability-Based RFID Privacy Models. The 8th International Conference on Applied Cryptography and Network Security (ACNS), pages 475-492, Beijing, China, June 22-25 2010 (acceptance ratio 33/178 =18.5%).
  7. Shaoying Cai, Yingjiu Li, Tieyan Li, Robert Deng, Haixia Yao: Achieving High Security and Efficiency in RFID-Tagged Supply Chains. International Journal of Applied Cryptography (IJACT), 2(1): 3-12, 2010.
  8. Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. E. Tapiador, Tieyan Li, Yingjiu Li: Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer. Computer Networks 54(9): 1502-1508, Elsevier, 2010.
  9. Kuo-Hui Yeh, N.W. Lo, Yingjiu Li, Enrico Winata: An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification. The 6th IEEE International Workshop on Heterogeneous Wireless Networks (AINA Workshop), pages 335-338, Perth, Australia, April 20-23, 2010.

 

2009

  1. Changshe Ma, Yingjiu Li, Robert Deng, Tieyan Li: RFID Privacy: Relation Between Two Notions, Minimal Condition, and Efficient Construction. The 16th ACM Conference on Computer and Communications Security (CCS 2009), pages 54-65, Chicago, US, November 9-13, 2009 (acceptance ratio 58/315 = 18.4%).
  2. Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert Deng: On Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. The 5th International Conference on Information Systems Security (ICISS), pages 71-85, Kolkata, India, December 14-18, 2009. (acceptance ratio 18/91=19.8%).
  3. Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert Deng: Flexible and Secure Secret Updating for Unidirectional Key Distribution in RFID-enabled Supply Chains. The 11th International Conference on Information and Communications Security (ICICS), pages 150-164, Beijing, China, December 14-17, 2009. (acceptance ratio 31/164 = 18.9%)
  4. Shaoying Cai, Tieyan Li, Yingjiu Li, Robert Deng: Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. The 5th Information Security Practice and Experience Conference (ISPEC 2009), pages 372-383, LNCS 5451, Xi'an, China, April 13-15, 2009. (acceptance ratio 36/160 = 22.5%)
  5. Shaoying Cai, Yingjiu Li, Tieyan Li, Robert Deng: Attacks and improvements to an RFID mutual authentication protocol (short paper). The 2nd ACM Conference on Wireless Network Security (WiSec' 09), pages 51-58, Zurich, Switzerland, March 16-18, 2009. (acceptance ratio 28/107 = 26.2%)
  6. Qiang Yan, Yingjiu Li, Tieyan Li, Robert Deng: A comprehensive study for RFID malwares on mobile devices. The 5th Workshop on RFID Security (RFIDsec 2009 Asia), Taipei, Taiwan, January 9- 11, 2009.
  7. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan Estevez-Tapiador, Tieyan Li, Yingjiu Li: Vulnerability analysis of RFID protocols for tag ownership transfer. The 5th Workshop on RFID Security (RFIDsec 2009 Asia), Taipei, Taiwan, January 9- 11, 2009.

 

2008

  1. Tong-Lee Lim, Tieyan Li, Yingjiu Li: A Security and Performance Evaluation of Hash-based RFID Protocols. The 4th International Conferences on Information Security and Cryptology (Inscrypt), pages 406-424, LNCS 5487, Beijing, December 14-17, 2008 (acceptance ratio 32/183=17.5%).

 

2007 

  1. Yingjiu Li, Xuhua Ding: Protecting RFID Communications in Supply Chains. ACM Symposium on InformAtion, Computer, and Communication Security (ASIACCS’07), pages 234-241, Singapore, March 20-22, 2007 (acceptance ratio 33/188 = 17.6%).

 

 

Last updated: Jan 2014.