For RFID will replace bar code, and will be
used everywhere.
Announcements:
Hack-Proofing Our Devices (ACM TechNews
December 28, 2016 edition). [headlines,
full
article]
Recent Book Coauthored (Morgan &
Claypool 2013)
Yingjiu Li, Robert
H. Deng, Elisa Bertino: RFID Security and
Privacy. 158 pages, ISBN-13: 978-1627053259, Synthesis Lectures on
Information Security, Privacy, & Trust, Morgan & Claypool Publishers,
December 2013. [purchase
hardcopy at Amazon] [purchase softcopy at
M&C]
RFID Workshops Chaired
Yingjiu Li
serves as a general co-chair for the Workshop on RFID and IoT
Security (RFIDsec Asia) in 2013. He serves on the
steering committee for Workshop on RFID Security (RFIDsec
and RFIDsec Asia) since 2009. He also serves as
program committee co-chair for the Workshop on RFID Security (RFIDsec Asia) in 2010, 2012, 2014.
Robert Deng
serves as general co-chair for the Workshop on RFID and IoT
Security in 2012, 2014.
Tieyan Li
serves as program committee co-chair for the Workshop on RFID Security (RFIDsec Asia) in 2011.
Adopting
RFID technology is an emerging trend in industry as it enables product
information to be collected, shared, and managed in real time. However, the
RFID technology has also triggered significant security concerns as industry
espionage may eavesdrop on wireless RFID communications and launch active
attacks. To address the security concerns in RFID applications, we created the
RFID Security Lab on August 1, 2008. Since then, we have been conducting
comprehensive research on RFID system security, including
- Design/attack/analysis of RFID
security protocols (slides
1, slides
2)
- Theoretical research on RFID
security and privacy notions (slides
1, slides
2, slides
3, slides
4)
- Protection of EPCglobal network services (slides
1, slides
2)
- Security of RFID-enabled supply
chains (slides1,
slides
2, slides
3, slides
4)
- Performance evaluation of
secure RFID systems (slides
1, slides
2, slides
3)
- Secure EPC discovery service in
EPCglobal Network (slides
1)
Mechanisms
for joint work:
collaborate in RFID security and privacy research; provide industry
requirements and participate in user testing for the development of practical
RFID information platforms.
Mechanisms
for financial & resource support: Resources for
supporting research engineers; resources for equipment.
Team
members:
- Supervisors: Yingjiu Li (SMU),
Robert Deng (SMU), Tieyan Li (I2R)
- Collaborators: Eng Wah Lee
(National RFID Center), Wei He (SIMTech)
- Research fellows/assistants:
- Jie Shi, Hongbing
Wang, Kailash Raghuwanshi, Darren Sim
- Changshe Ma (till October 2009), Kevin
Chiew (till Jan 2011), Chunhua Su (till March 2011), Ge Fu (till April
2010)
- PhD students: Qiang Yan,
Shaoying Cai
- Master students: Bing Liang
Research
grants:
- Yingjiu Li (PI), Robert Deng,
Tieyan Li, Lee Eng Hua: A Security Framework for EPCglobal
Network. Sponsored by A-Star Public Sector R&D Projects,
S$479,700+95,940=575,640, 1 August 2008- 31 July 2011 (SERC Grant No. 082
101 0022).
- Robert Deng, Yingjiu Li, Yan
Zheng, Qiang Yan: The Use of Mobile Devices in RFID-Based Supply Chain
Management. Nokia Beijing, US$14,655 and two tablet PCs, September 2009-
September 2010.
Talks/demos/presentations
(with link to slides):
- Yingjiu Li gave a presentation
on Efficient Tag Path Authentication with Less Tag Memory, the 12th
International Conference on Information Security Practice and Experience
(ISPEC), 2016.
- Yingjiu Li gave a presentation
on AnonEPC, 2014
IEEE RFID Technology and Applications Conference (RFID-TA), 2014.
- Yingjiu Li gave a presentation
on Batch Clone Detection for RFID-enabled Supply Chain. IEEE RFID 2014.
- Yingjiu Li gave a presentation
on Design
and Implementation of a Secure Prototype for EPCglobal
Network Services, RFIDsec Asia 2012.
- Yingjiu Li gave a presentation
on Secure
and Practical Key Distribution for RFID-Enabled Supply Chains, SecureComm 2011.
- Robert H. Deng and Yingjiu Li
gave an invited talk on RFID security and privacy at both physical and
system levels, Internet of Things -Global Standards Initiative (IoT-GSI) Meeting, International Telecommunications
Union (ITU), Geneva, Switzerland, 22-26 August 2011.
- Yingjiu Li gave a presentation
on A Role-Based Authorization Framework for RFID-Enabled Supply Chain
Networks, SDPS 2011.
- Yingjiu Li gave presentations
on RFID Mutual Authentication Protocols with Universally Composable Security and on False Authentications for
C1G2 Passive RFID Tags, RFIDsec 2011 Asia
- Yingjiu Li gave a presentation
on time
cost evaluation for RFID authentication protocols, IoT
2010.
- Yingjiu Li gave a presentation
on new
framework for RFID privacy, ESORICS 2010.
- Robert Deng gave a presentation
on pseudonym-based
RFID discovery service, ISDPE 2010.
- Robert Deng gave a presentation
on unpredictability-based
RFID privacy models, ACNS 2010.
- Robert Deng gave a keynote
speech on RFID
privacy models and a minimal condition, Inscrypt
2009.
- Yingjiu Li gave a presentation
on untraceability of an RFID authentication protocol,
ICISS 2009.
- Tieyan Li gave a presentation
on secure
key updating in RFID-enabled supply chains, ICICS 2009.
- Yingjiu Li gave a presentation
on RFID
privacy notions, CCS 2009.
- Tieyan Li gave an invited talk
on interaction
models in EPCDS and the security implications, 1st
Singapore-Taiwan Joint RFID Seminar, National RFID Centre, Singapore, June
19, 2009.
- Kevin Chiew gave a talk on tag-to-reader
authentication, RFID World Asia and EPCglobal
RFID Singapore Summit 2009, Singapore, April 22–24, 2009.
- Tieyan Li gave a presentation
on dual
security mode in RFID-enabled supply chains, ISPEC 2009.
- Shaoying Cai gave a
presentation on attacks
and improvements on an RFID authentication protocol, Wisec 2009.
- Yingjiu Li gave a presentation
on RFID
malware, RFIDsec'09 Asia, 2009.
- Tieyan Li gave a presentation
on security
and performance evaluation on hash based RFID protocols, Inscrypt 2008.
- Yingjiu Li gave an invited talk
on EPCglobal network security, National RFID Center,
Singapore, August 1, 2008.
- Xuhua Ding gave a presentation
on protecting
RFID communications in supply chains, ASIACCS 2007.
Publications:
2019
- Pamela Hui Ting Chua, Yingjiu
Li, Wei He: Adopting Hyperledger Fabric Blockchain for EPCglobal
Network. Accepted by the 13th Annual
International Conference on RFID (IEEE RFID), Phoenix, AZ, April 2-4,
2019.
2018
1. Hui Cui, Robert H. Deng, Joseph K.
Liu, Xun Yi, Yingjiu Li: Server-Aided Attribute-Based Signature with Revocation
for Resource-Constrained Industrial-Internet-of-Things Devices. IEEE
Transactions on Industrial Informatics (IND INFORM), 14(8): 3724-3732,
2018.
2. Kai Bu, Yingjiu Li: Every Step You
Take, I'll Be Watching You: Practical StepAuth-entication
of RFID Paths. IEEE
Transactions on Information Forensics and Security (TIFS), 13(4): 834-849,
2018 (accepted in 2017).
2016
1. Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:
Efficient Tag Path Authentication Protocol with Less Tag Memory. The 12th International
Conference on Information Security Practice and Experience (ISPEC), pages
255-270, Zhangjiajie, China, November 16-18, 2016.
2015
1.
Chunhua
Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang: Universally Composable RFID Mutual Authentication. IEEE Transactions on Dependable and
Secure Computing (TDSC), 14(1): 83-94, 2017 (accepted in 2015).
2014
1.
Kuo-Hui
Yeh, Nai-Wei Lo, Kuo-Yu
Tsai, Yingjiu Li, Enrico Winata: A Novel RFID Tag
Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration, Wireless Personal Communications,
77(3): 1775-1800, Springer, 2014.
2.
Gaurang Torvekar, Yingjiu
Li: AnonEPC - Making the Querying User Anonymous in EPCglobal Network. 2014
IEEE RFID Technology and Applications Conference (RFID-TA), pages 289-294,
Tampere, Finland, September 8-9, 2014.
3.
Jie
Shi, Su Mon Kywe, Yingjiu Li: Batch Clone Detection for RFID-enabled Supply
Chain. The 8th Annual IEEE International
Conference on RFID (IEEE RFID 2014), pages 154-161, Orlando, Florida, USA,
April 8-10, 2014 (acceptance ratio 24%).
2013
- Yingjiu Li, Robert H. Deng, Elisa
Bertino: RFID
Security and Privacy. Synthesis Lectures on Information Security,
Privacy, & Trust, Morgan & Claypool Publishers, 2013.
- Kevin Chiew,
Yingjiu Li, Congfu Xu: On RFID False Authentications.
Book chapter in Big Data and Internet of Things: A Roadmap for Smart
Environments, pages 91-110, edited by N. Bessis
and C. Dobre, Springer, 2013.
- Qiang Yan, Yingjiu Li, Robert
Deng: Malware Protection on RFID-Enabled Supply Chain Management Systems
in the EPCglobal Network. Advanced Security and
Privacy for RFID Technologies, edited by Ali Miri, pages 153-175, IGI
Global, 2013.
- Jie Shi, Yingjiu Li, Robert
Deng, Wei He, Eng Wah Lee: A Secure Platform for Information Sharing in EPCglobal Network. International Journal
of RFID Security and Cryptography (IJRFIDSC), 2(1-4), 107-118, 2013.
- Su Mon Kywe, Yingjiu Li, Jie
Shi: Attack and Defense Mechanisms of Malicious EPC Event Injection in EPC
Discovery Service. 2013 IEEE
International Conference on RFID Technologies and Applications (IEEE RFID
TA), Johor Bahru, Malaysia, September 4-5,
2013.
2012
- Jie Shi, Yingjiu Li, Robert
Deng, Kevin Chiew: Design and Implementation of a Secure Prototype for EPCglobal Network Services. The
2012 Workshop on RFID and IoT Security (RFIDsec Asia), pages 45-56, Taipei, Taiwan,
November 8-9, 2012.
- Jie Shi, Yingjiu Li, Robert
Deng: A Secure and Efficient Discovery Service System in EPCglobal Network. Computers
and Security, 31(8), 870-885, Elsevier, November 2012.
- Shaoying Cai, Robert Deng,
Yingjiu Li, Yunlei Zhao: A New Framework for
Privacy of RFID Path Authentication. The 10th
International Conference on Applied Cryptography and Network Security
(ACNS 2012), pages 473-488, Singapore, June 26-29, 2012 (acceptance
ratio 33/192=17.2%).
- Jie Shi, Yingjiu Li, Wei He,
Darren Sim: SecTTS: A Secure Track & Trace System for
RFID-Enabled Supply Chains. Computers
in Industry 63 (2012), 574-585, Elsevier, 2012.
- Kuo-Hui Yeh, N.W. Lo, Yingjiu
Li, Yung-Chun Chen, Tzong-Chen Wu: New Findings
on RFID Authentication Schemes against De-synchronization Attack. International Journal of Innovative
Computing Information and Control (IJICIC), 8(7A), 4431-4449, ICIC
International, 2012.
- Shaoying Cai, Yingjiu Li, Yunlei Zhao: Distributed Path Authentication for
Dynamic RFID-Enabled Supply Chains. The
27th IFIP International Information Security and Privacy Conference (SEC),
pages 501-512, Heraklion, Crete, Greece, June 4-6, 2012 (acceptance ratio
42/167 = 25.1%).
- Hongbing Wang, Yingjiu Li, Zongyang Zhang, Zhenfu Cao:
Two-level Path Authentication in EPCglobal
Network. The 6th Annual IEEE
International Conference on RFID (IEEE RFID), pages 24-31, Orlando,
Florida, April 3-5, 2012 (acceptance ratio 25%).
- Qiang Yan, Yingjiu Li, Robert
Deng: Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain
Systems (invited paper). International
Journal of RFID Security and Cryptography (IJRFIDSC), 1(1/2), 25-35,
Informatics Society, 2012.
- Jie Shi, Darren Sim, Yingjiu
Li, Robert Deng: SecDS: A Secure EPC Discovery
Services System in EPCglobal Network (short
paper). The 2nd ACM Conference on Data
and Application Security and Privacy (CODASPY), pages 267-274, San
Antonio, TX, USA, February 7-9, 2012 (acceptance ratio 29/113 = 25.7%).
- Su Mon Kywe, Jie Shi, Yingjiu
Li, Raghuwanshi Kailash: Evaluation of Different
Electronic Product Code Discovery Service Models. Advances in Internet of Things
(AIT), 2(2), 37-46, Scientific Research Publishing, 2012.
- Chunhua Su, Yingjiu
Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou: A Survey on Privacy
Frameworks for RFID Authentication (invited paper). IEICE
Transactions 95-D(1): 2-11 (2012).
2011
- Tieyan Li, Yingjiu Li, Guilin
Wang: Secure
and Practical Key Distribution for RFID-Enabled Supply Chains. The 7th International ICST Conference on
Security and Privacy in Communication Networks (SecureComm),
London, UK, September 7-9, 2011 (acceptance ratio 23/95=24.2%).
- Robert Deng, Yingjiu Li, Moti Yung, Yunlei Zhao: A
Zero-Knowledge Based Framework for RFID Privacy. Journal of
Computer Security (JCS), 19(6), 1109-1146, IOS, 2011.
- Yingjiu Li, Robert Deng, Junzuo Lai, Changshe Ma: On
Two RFID Privacy Notions and Their Relations. ACM Transactions on Information and System
Security (TISSEC), 14(4), 30:1-23, ACM, 2011.
- Yung-Chun Chen, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li and Enrico Winata:
Adaptive
Collision Resolution for Efficient RFID Tag Identification. EURASIP Journal on Wireless
Communications and Networking, 2011.
- Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li: Cryptanalysis of Hsiang-Shih’s Authentication Scheme for Multi-Server
Architecture. International
Journal of Communication Systems (IJCS), 24(7): 829-836, Wiley, 2011.
- Wei He, Yingjiu Li, Kevin Chiew, Tieyan Li, Eng Wah
Lee: A
Solution with Security Concern for RFID-Based Track and Trace Services in EPCglobal-Enabled Supply Chains. Book chapter in
Designing and Deploying RFID Applications, pages 95-108, edited by
Cristina Turcu, Intech,
ISBN 978-953-307-265-4, June 2011.
- Ge Fu, Yingjiu Li: A Role-Based
Authorization Framework for RFID-Enabled Supply Chain Networks. SDPS 2011 Conference — The 16th
International Conference on Transformative Science, Engineering, and
Business Innovation, Jeju Island, South
Korea, June 12-16, 2011.
- Chunhua Su, Yingjiu Li, Robert
Deng: RFID Mutual Authentication Protocols with Universally Composable Security. RFIDsec 2011 Asia, pages 35-49, Wuxi, China, April
6-8, 2011.
- Kevin Chiew, Yingjiu Li, Tieyan
Li, Robert Deng: On False Authentications for C1G2 Passive RFID Tags. RFIDsec 2011 Asia, pages 50-65, Wuxi, China, April
6-8, 2011.
2010
- Shaoying Cai, Chunhua Su,
Yingjiu Li, Robert Deng, Tieyan Li: Protecting and Restraining the Third
Party in RFID-Enabled 3PL Supply Chains. The 6th International Conference on
Information Systems Security (ICISS 2010), pages 246-260, Gandhinagar
Gujarat, India, 15-19 December 2010 (acceptance ratio14/51=27.5%).
- Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li, Yi-Xiang Hung: Two Robust
Remote User Authentication Protocols Using Smart Cards. Journal
of Systems and Software (JSS), 83(2010): 2556-2565, Elsevier, 2010.
- Kevin Chiew, Yingjiu Li, Tieyan
Li, Robert Deng, Manfred Aigner: Time Cost Evaluation for Executing RFID
Authentication Protocols, Internet of
Things 2010 Conference (IOT), Tokyo, Nov 29-Dec 1, 2010 (acceptance
ratio 28/104=26.9%).
- Robert Deng, Yingjiu Li, Moti Yung, Yunlei Zhao: A
New Framework for RFID Privacy. The
15th European Symposium on Research in Computer Security (ESORICS),
pages 1-18, Athens, Greece, September 20-22, 2010 (acceptance ratio
42/201=20.8%).
- Qiang Yan, Robert Deng, Ivy
Zheng, Yingjiu Li, Tieyan Li: Pseudonym-based
RFID Discovery Service to Mitigate Unauthorized Tracking in Supply Chain
Management. The
2nd International Symposium on Data, Privacy and E-Commerce (ISDPE),
Buffalo/Niagara Falls, September 13-14, 2010.
- Junzuo Lai, Robert H. Deng,
Yingjiu Li: Revisiting Unpredictability-Based RFID Privacy Models. The 8th International Conference
on Applied Cryptography and Network Security (ACNS), pages 475-492,
Beijing, China, June 22-25 2010 (acceptance ratio 33/178 =18.5%).
- Shaoying Cai, Yingjiu Li, Tieyan Li, Robert Deng, Haixia Yao: Achieving High
Security and Efficiency in RFID-Tagged Supply Chains. International
Journal of Applied Cryptography (IJACT), 2(1): 3-12, 2010.
- Pedro Peris-Lopez,
Julio C. Hernandez-Castro, Juan M. E. Tapiador, Tieyan Li, Yingjiu Li: Vulnerability Analysis of RFID
Protocols for Tag Ownership Transfer. Computer
Networks 54(9): 1502-1508, Elsevier, 2010.
- Kuo-Hui Yeh, N.W. Lo, Yingjiu
Li, Enrico Winata: An Adaptive n-Resolution
Anti-Collision Algorithm for RFID Tag Identification. The 6th IEEE
International Workshop on Heterogeneous Wireless Networks (AINA Workshop),
pages 335-338, Perth, Australia, April 20-23, 2010.
2009
- Changshe Ma, Yingjiu Li, Robert Deng,
Tieyan Li: RFID Privacy: Relation Between Two Notions, Minimal Condition,
and Efficient Construction. The
16th ACM Conference on Computer and Communications Security (CCS 2009),
pages 54-65, Chicago, US, November 9-13, 2009 (acceptance ratio 58/315 =
18.4%).
- Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li,
Robert Deng: On Untraceability of Anonymous RFID
Authentication Protocol with Constant Key-Lookup. The 5th International Conference
on Information Systems Security (ICISS), pages 71-85, Kolkata, India,
December 14-18, 2009. (acceptance ratio 18/91=19.8%).
- Shaoying Cai, Tieyan Li, Changshe Ma,
Yingjiu Li, Robert Deng: Flexible and Secure Secret Updating for
Unidirectional Key Distribution in RFID-enabled Supply Chains. The 11th International Conference on
Information and Communications Security (ICICS), pages 150-164,
Beijing, China, December 14-17, 2009. (acceptance ratio 31/164 = 18.9%)
- Shaoying Cai, Tieyan Li, Yingjiu Li, Robert Deng: Ensuring Dual
Security Modes in RFID-Enabled Supply Chain Systems. The 5th
Information Security Practice and Experience Conference (ISPEC 2009),
pages 372-383, LNCS 5451, Xi'an, China, April 13-15, 2009. (acceptance
ratio 36/160 = 22.5%)
- Shaoying Cai, Yingjiu Li, Tieyan Li, Robert Deng: Attacks and improvements to an
RFID mutual authentication protocol (short paper). The 2nd ACM
Conference on Wireless Network Security (WiSec'
09), pages 51-58, Zurich, Switzerland, March 16-18, 2009. (acceptance
ratio 28/107 = 26.2%)
- Qiang Yan, Yingjiu Li, Tieyan
Li, Robert Deng: A comprehensive study for RFID malwares on mobile
devices. The 5th
Workshop on RFID Security (RFIDsec 2009 Asia),
Taipei, Taiwan, January 9- 11, 2009.
- Pedro Peris-Lopez,
Julio Cesar Hernandez-Castro, Juan Estevez-Tapiador,
Tieyan Li, Yingjiu Li: Vulnerability analysis of
RFID protocols for tag ownership transfer. The 5th Workshop on
RFID Security (RFIDsec 2009 Asia), Taipei,
Taiwan, January 9- 11, 2009.
2008
- Tong-Lee Lim, Tieyan Li,
Yingjiu Li: A Security and Performance Evaluation of Hash-based RFID
Protocols. The 4th International Conferences on Information Security and
Cryptology (Inscrypt), pages 406-424, LNCS 5487,
Beijing, December 14-17, 2008 (acceptance ratio 32/183=17.5%).
2007
- Yingjiu Li, Xuhua Ding:
Protecting RFID Communications in Supply Chains. ACM Symposium on InformAtion, Computer, and Communication Security
(ASIACCS’07), pages 234-241, Singapore, March 20-22, 2007 (acceptance
ratio 33/188 = 17.6%).
Technical
disclosures:
- Tieyan
Li: Method and System for Protecting RFID tags in RFID-enabled Supply
Chains, I2R-TD2010017,
June 14, 2010.
- Tieyan
Li: 2-Mode Tag Authentication in RFID-enabled Supply Chain, I2R-TD2010xxx, June 15, 2010.
Conference
organization and journal editorship:
- The 2013 Workshop on RFID and IoT Security (RFIDsec’13, Asia) Yingjiu Li serves as a
general co-chair.
- The 2012 Workshop on RFID and IoT Security (RFIDsec’12 Asia), Yingjiu Li serves as a
program committee co-chair.
- The 2011 Workshop on RFID
Security (RFIDsec'11 Asia), Tieyan Li serves as a program committee
co-chair, and Yingjiu Li is on the program committee.
- 2010 workshop on RFID
security (RFIDsec’10 Asia), Robert Deng and Lee Eng Wah served as
general co-chairs, Yingjiu Li served as a program committee co-chair, and
Tieyan Li was on the program committee.
- Journal of
Computer Security special issue on RFID System Security, Yingjiu Li
served as a guest editor.
Visitors:
- Prof. Sozo
Inoue (associate professor, Kyushu Institute of
Technology, Japan), May 21, 2012.
- Prof. Kouichi Sakurai (research director, Institute of System and Information
Technologies, Kyushu University, Japan), December 19, 2011.
- Dr. Gerhard Hancke
(senior researcher, Information Security Group at
Royal Holloway, University of London, UK), Feb 11, 2011.
- Prof. Kouichi Sakurai (research director, Institute of System and Information
Technologies, Kyushu University, Japan), March 31, 2010, and July
28, 2009.
- Prof. Nai-Wei
Lo (assistant professor, National Taiwan
University of Science and Technology, ROC), July 24, 2009.
- Mr. Lim Chuan Poh (A*STAR chairman, Singapore), July 14, 2009.
- Prof. Melanie Rieback (assistant professor,
Vrije University in Amsterdam, Netherlands),
May 15, 2009.
- Dr Manfred Aigner (senior RFID researcher, TU Graz, Austria),
January 15, 2009.
- Dr Ari Juels
(chief scientist and director of RSA Lab, USA),
December 5, 2008.
Equipment:
RFID
Readers:
3 A828 readers, brand and manufacturer: CAEN, model: A828
1 A528 reader, brand and manufacturer: CAEN, model: A528
2 SR112 readers, brand and manufacturer: SmartID,
model: SR112 (I2R assets)
4 SR113 readers, brand and manufacturer: SmartID,
model: SR113
RFID Tags:
6 tags, brand and model: IAIK UHF demotag, manufacturer:
IAIK, Technical Univ, Graz, Austria.
(currently
purchasing 4 UHF demotags with ATxMega
controller and ECDSA software module)
2 EPC IS
and DS servers (currently purchasing 2 laptop PCs)
Memorable
moments:
Last updated: December
2013.