IoT
Security and Privacy
Summary of research on RFID security and
privacy
Summary of research on secure EPC discovery
services in EPCglobal network
Publications:
2019
- Pamela Hui Ting Chua, Yingjiu
Li, Wei He: Adopting Hyperledger Fabric Blockchain for EPCglobal
Network. Accepted by the 13th Annual
International Conference on RFID (IEEE RFID), Phoenix, AZ, April 2-4,
2019.
2018
1. Hui Cui, Robert H. Deng, Joseph K.
Liu, Xun Yi, Yingjiu Li: Server-Aided Attribute-Based Signature with Revocation
for Resource-Constrained Industrial-Internet-of-Things Devices. IEEE
Transactions on Industrial Informatics (IND INFORM), 14(8): 3724-3732,
2018.
2. Kai Bu, Yingjiu Li: Every Step You
Take, I'll Be Watching You: Practical StepAuth-entication of RFID Paths. IEEE
Transactions on Information Forensics and Security (TIFS), 13(4): 834-849,
2018 (accepted in 2017).
2016
1. Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:
Efficient Tag Path Authentication Protocol with Less Tag Memory. The 12th International
Conference on Information Security Practice and Experience (ISPEC), pages
255-270, Zhangjiajie, China, November 16-18, 2016.
2015
1.
Chunhua
Su, Bagus Santoso, Yingjiu
Li, Robert H. Deng, Xinyi Huang: Universally Composable
RFID Mutual Authentication. IEEE
Transactions on Dependable and Secure Computing (TDSC), 14(1): 83-94, 2017
(accepted in 2015).
2014
- Kuo-Hui Yeh, Nai-Wei Lo, Kuo-Yu Tsai,
Yingjiu Li, Enrico Winata: A Novel RFID Tag
Identification Protocol: Adaptive n-Resolution and k-Collision
Arbitration, Wireless
Personal Communications, 77(3): 1775-1800, Springer, 2014.
2.
Gaurang Torvekar, Yingjiu
Li: AnonEPC - Making the Querying User Anonymous in EPCglobal Network. 2014
IEEE RFID Technology and Applications Conference (RFID-TA), pages 289-294,
Tampere, Finland, September 8-9, 2014.
3.
Jie
Shi, Su Mon Kywe, Yingjiu Li: Batch Clone Detection for RFID-enabled Supply
Chain. The 8th Annual IEEE International
Conference on RFID (IEEE RFID 2014), pages 154-161, Orlando, Florida, USA,
April 8-10, 2014 (acceptance ratio 24%).
2013
- Yingjiu Li, Robert H. Deng, Elisa Bertino: RFID
Security and Privacy. 158 pages, ISBN-13: 978-1627053259, Synthesis
Lectures on Information Security, Privacy, & Trust, Morgan &
Claypool Publishers, 2013.
- Kevin Chiew,
Yingjiu Li, Congfu Xu: On RFID False
Authentications. Book chapter in Big Data and Internet of Things: A Roadmap
for Smart Environments, pages 91-110, edited by N. Bessis
and C. Dobre, Springer, 2013.
- Qiang Yan, Yingjiu Li, Robert
Deng: Malware Protection on RFID-Enabled Supply Chain Management Systems
in the EPCglobal Network. Advanced Security and Privacy
for RFID Technologies, edited by Ali Miri, pages 153-175, IGI Global,
2013.
- Jie Shi, Yingjiu Li, Robert
Deng, Wei He, Eng Wah Lee: A Secure Platform for Information Sharing in EPCglobal Network. International Journal
of RFID Security and Cryptography (IJRFIDSC), 2(1-4), 107-118, 2013.
- Su Mon Kywe, Yingjiu Li, Jie
Shi: Attack and Defense Mechanisms of Malicious EPC Event Injection in EPC
Discovery Service. 2013 IEEE
International Conference on RFID Technologies and Applications (IEEE RFID
TA), Johor Bahru, Malaysia, September 4-5,
2013.
2012
- Jie Shi, Yingjiu Li, Robert
Deng, Kevin Chiew: Design and Implementation of
a Secure Prototype for EPCglobal Network
Services. The
2012 Workshop on RFID and IoT Security (RFIDsec Asia), pages 45-56, Taipei, Taiwan,
November 8-9, 2012.
- Jie Shi, Yingjiu Li, Robert Deng:
A Secure and Efficient Discovery Service System in EPCglobal
Network. Computers
and Security, 31(8), 870-885, Elsevier, November 2012.
- Shaoying Cai, Robert Deng,
Yingjiu Li, Yunlei Zhao: A New Framework for
Privacy of RFID Path Authentication. The 10th
International Conference on Applied Cryptography and Network Security
(ACNS 2012), pages 473-488, Singapore, June 26-29, 2012 (acceptance
ratio 33/192=17.2%).
- Jie Shi, Yingjiu Li, Wei He,
Darren Sim: SecTTS: A Secure Track & Trace System for
RFID-Enabled Supply Chains. Computers
in Industry 63 (2012), 574-585, Elsevier, 2012.
- Kuo-Hui Yeh, N.W. Lo, Yingjiu
Li, Yung-Chun Chen, Tzong-Chen Wu: New Findings
on RFID Authentication Schemes against De-synchronization
Attack. International Journal of
Innovative Computing Information and Control (IJICIC), 8(7A),
4431-4449, ICIC International, 2012.
- Shaoying Cai, Yingjiu Li, Yunlei Zhao: Distributed Path Authentication for
Dynamic RFID-Enabled Supply Chains. The
27th IFIP International Information Security and Privacy Conference (SEC),
pages 501-512, Heraklion, Crete, Greece, June 4-6, 2012 (acceptance ratio
42/167 = 25.1%).
- Hongbing Wang, Yingjiu Li, Zongyang Zhang, Zhenfu Cao:
Two-level Path Authentication in EPCglobal
Network. The 6th Annual IEEE
International Conference on RFID (IEEE RFID), pages 24-31, Orlando,
Florida, April 3-5, 2012 (acceptance ratio 25%).
- Qiang Yan, Yingjiu Li, Robert
Deng: Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain
Systems (invited paper). International
Journal of RFID Security and Cryptography (IJRFIDSC), 1(1/2), 25-35,
Informatics Society, 2012.
- Jie Shi, Darren Sim, Yingjiu
Li, Robert Deng: SecDS: A Secure EPC Discovery
Services System in EPCglobal Network (short
paper). The 2nd ACM Conference on Data
and Application Security and Privacy (CODASPY), pages 267-274, San
Antonio, TX, USA, February 7-9, 2012 (acceptance ratio 29/113 = 25.7%).
- Su Mon Kywe, Jie Shi, Yingjiu
Li, Raghuwanshi Kailash: Evaluation of Different
Electronic Product Code Discovery Service Models. Advances in Internet of Things
(AIT), 2(2), 37-46, Scientific Research Publishing, 2012.
- Chunhua Su, Yingjiu
Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou: A Survey on Privacy
Frameworks for RFID Authentication (invited paper). IEICE
Transactions 95-D(1): 2-11 (2012).
2011
- Tieyan Li, Yingjiu Li, Guilin Wang: Secure and
Practical Key Distribution for RFID-Enabled Supply Chains. The 7th International ICST Conference on
Security and Privacy in Communication Networks (SecureComm),
London, UK, September 7-9, 2011 (acceptance ratio 23/95=24.2%).
- Robert Deng, Yingjiu Li, Moti Yung, Yunlei Zhao: A
Zero-Knowledge Based Framework for RFID Privacy. Journal of
Computer Security (JCS), 19(6), 1109-1146, IOS, 2011.
- Yingjiu Li, Robert Deng, Junzuo Lai, Changshe Ma: On
Two RFID Privacy Notions and Their Relations. ACM Transactions on Information and System
Security (TISSEC), 14(4), 30:1-23, ACM, 2011.
- Yung-Chun Chen, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li and Enrico Winata:
Adaptive
Collision Resolution for Efficient RFID Tag Identification. EURASIP Journal on Wireless
Communications and Networking, 2011.
- Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li: Cryptanalysis of Hsiang-Shih’s Authentication Scheme for Multi-Server
Architecture. International
Journal of Communication Systems (IJCS), 24(7): 829-836, Wiley, 2011.
- Wei He, Yingjiu Li, Kevin Chiew, Tieyan Li, Eng Wah
Lee: A
Solution with Security Concern for RFID-Based Track and Trace Services in EPCglobal-Enabled Supply Chains. Book chapter in
Designing and Deploying RFID Applications, pages 95-108, edited by
Cristina Turcu, Intech,
ISBN 978-953-307-265-4, June 2011.
- Ge Fu, Yingjiu Li: A Role-Based
Authorization Framework for RFID-Enabled Supply Chain Networks. SDPS 2011 Conference — The 16th
International Conference on Transformative Science, Engineering, and
Business Innovation, Jeju Island, South
Korea, June 12-16, 2011.
- Chunhua Su, Yingjiu Li, Robert
Deng: RFID Mutual Authentication Protocols with Universally Composable Security. RFIDsec 2011 Asia, pages 35-49, Wuxi, China, April
6-8, 2011.
- Kevin Chiew,
Yingjiu Li, Tieyan Li, Robert Deng: On False
Authentications for C1G2 Passive RFID Tags. RFIDsec 2011 Asia, pages 50-65, Wuxi, China, April
6-8, 2011.
2010
- Shaoying Cai, Chunhua Su,
Yingjiu Li, Robert Deng, Tieyan Li: Protecting and
Restraining the Third Party in RFID-Enabled 3PL Supply Chains. The 6th International Conference on
Information Systems Security (ICISS 2010), pages 246-260, Gandhinagar
Gujarat, India, 15-19 December 2010 (acceptance ratio14/51=27.5%).
- Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li, Yi-Xiang Hung: Two Robust
Remote User Authentication Protocols Using Smart Cards. Journal
of Systems and Software (JSS), 83(2010): 2556-2565, Elsevier, 2010.
- Kevin Chiew,
Yingjiu Li, Tieyan Li, Robert Deng, Manfred Aigner: Time Cost Evaluation for Executing RFID
Authentication Protocols, Internet of
Things 2010 Conference (IOT), Tokyo, Nov 29-Dec 1, 2010 (acceptance
ratio 28/104=26.9%).
- Robert Deng, Yingjiu Li, Moti Yung, Yunlei Zhao: A
New Framework for RFID Privacy. The
15th European Symposium on Research in Computer Security (ESORICS),
pages 1-18, Athens, Greece, September 20-22, 2010 (acceptance ratio
42/201=20.8%).
- Qiang Yan, Robert Deng, Ivy
Zheng, Yingjiu Li, Tieyan Li: Pseudonym-based
RFID Discovery Service to Mitigate Unauthorized Tracking in Supply Chain
Management. The
2nd International Symposium on Data, Privacy and E-Commerce (ISDPE),
Buffalo/Niagara Falls, September 13-14, 2010.
- Junzuo Lai, Robert H. Deng, Yingjiu
Li: Revisiting Unpredictability-Based RFID Privacy Models. The 8th International Conference
on Applied Cryptography and Network Security (ACNS), pages 475-492,
Beijing, China, June 22-25 2010 (acceptance ratio 33/178 =18.5%).
- Shaoying Cai, Yingjiu Li, Tieyan Li, Robert Deng, Haixia Yao: Achieving High
Security and Efficiency in RFID-Tagged Supply Chains. International
Journal of Applied Cryptography (IJACT), 2(1): 3-12, 2010.
- Pedro Peris-Lopez,
Julio C. Hernandez-Castro, Juan M. E. Tapiador, Tieyan Li, Yingjiu Li: Vulnerability Analysis of RFID
Protocols for Tag Ownership Transfer. Computer
Networks 54(9): 1502-1508, Elsevier, 2010.
- Kuo-Hui Yeh, N.W. Lo, Yingjiu
Li, Enrico Winata: An Adaptive n-Resolution
Anti-Collision Algorithm for RFID Tag Identification. The 6th IEEE
International Workshop on Heterogeneous Wireless Networks (AINA Workshop),
pages 335-338, Perth, Australia, April 20-23, 2010.
2009
- Changshe Ma, Yingjiu Li, Robert Deng, Tieyan Li: RFID Privacy: Relation Between Two Notions,
Minimal Condition, and Efficient Construction. The 16th ACM Conference on
Computer and Communications Security (CCS 2009), pages 54-65, Chicago,
US, November 9-13, 2009 (acceptance ratio 58/315 = 18.4%).
- Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li,
Robert Deng: On Untraceability of Anonymous RFID
Authentication Protocol with Constant Key-Lookup. The 5th International Conference
on Information Systems Security (ICISS), pages 71-85, Kolkata, India,
December 14-18, 2009. (acceptance ratio 18/91=19.8%).
- Shaoying Cai, Tieyan Li, Changshe Ma,
Yingjiu Li, Robert Deng: Flexible and Secure Secret Updating for
Unidirectional Key Distribution in RFID-enabled Supply Chains. The 11th International Conference on
Information and Communications Security (ICICS), pages 150-164,
Beijing, China, December 14-17, 2009. (acceptance ratio 31/164 = 18.9%)
- Shaoying Cai, Tieyan Li, Yingjiu Li, Robert Deng: Ensuring Dual
Security Modes in RFID-Enabled Supply Chain Systems. The 5th
Information Security Practice and Experience Conference (ISPEC 2009),
pages 372-383, LNCS 5451, Xi'an, China, April 13-15, 2009. (acceptance
ratio 36/160 = 22.5%)
- Shaoying Cai, Yingjiu Li, Tieyan Li, Robert Deng: Attacks and improvements to an
RFID mutual authentication protocol (short paper). The 2nd ACM
Conference on Wireless Network Security (WiSec'
09), pages 51-58, Zurich, Switzerland, March 16-18, 2009. (acceptance
ratio 28/107 = 26.2%)
- Qiang Yan, Yingjiu Li, Tieyan Li, Robert Deng: A comprehensive study for RFID
malwares on mobile devices. The 5th Workshop on
RFID Security (RFIDsec 2009 Asia), Taipei,
Taiwan, January 9- 11, 2009.
- Pedro Peris-Lopez,
Julio Cesar Hernandez-Castro, Juan Estevez-Tapiador,
Tieyan Li, Yingjiu Li: Vulnerability analysis of
RFID protocols for tag ownership transfer. The 5th Workshop on
RFID Security (RFIDsec 2009 Asia), Taipei,
Taiwan, January 9- 11, 2009.
2008
- Tong-Lee Lim, Tieyan Li, Yingjiu Li: A Security and Performance
Evaluation of Hash-based RFID Protocols. The 4th International Conferences
on Information Security and Cryptology (Inscrypt),
pages 406-424, LNCS 5487, Beijing, December 14-17, 2008 (acceptance ratio
32/183=17.5%).
2007
- Yingjiu Li, Xuhua
Ding: Protecting RFID Communications in Supply Chains. ACM Symposium on InformAtion, Computer, and Communication Security
(ASIACCS’07), pages 234-241, Singapore, March 20-22, 2007 (acceptance
ratio 33/188 = 17.6%).
Last updated: Jan 2014.