Advertisement

Cluster Computing

, Volume 22, Supplement 4, pp 8605–8611 | Cite as

Efficient group authentication in RFID using secret sharing scheme

  • Yanxiao LiuEmail author
  • Qindong Sun
  • Yichuan Wang
  • Lei Zhu
  • Wenjiang Ji
Article
  • 125 Downloads

Abstract

Radio frequency identification (RFID) systems become more popular in recent years due to its low cost and high efficiency in identification. Authentication between tags and server is a key technology to protect the security of RFID systems. Most previous authentication approaches adopt hash functions or public cryptography, they need multiple rounds of communications between tags and sever. In this paper, we use threshold secret sharing scheme to propose a novel group authentication method in RFID. In our scheme, a group of tags can be authenticated by the sever with only need one-round communication, and the sever can identify the unqualified tags using the approach of cheater identification in secret sharing. The proposed authentication has efficient computation which is fit for RFID. More importantly, it can greatly reduce the cost of communication and also the risk of been attacked through the communication channel.

Keywords

RFID Authentication Secret sharing Cheater identification 

Notes

Acknowledgements

The research presented in this paper is supported in part by the China National Natural Science Foundation (No.: 61502384, 61571360, 61602374, 61602376, 61702411), Shaanxi Science and Technology Co-ordination and Innovation Project (No.: 2016KTZDGY05-09), and the Innovation Project of Shaanxi Provincial Department of Education (No.: 17JF023).

References

  1. 1.
    Michahelles, F., Thiesse, F., Schmidt, A., Williams, J.R.: Pervasive RFID and near field communication technology. IEEE Pervasive Comput. 6(3), 94–96 (2007)CrossRefGoogle Scholar
  2. 2.
    Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secur. Comput. 4(4), 337–340 (2007)CrossRefGoogle Scholar
  3. 3.
    Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. International Conference on Selected Areas in Cryptography, LNCS 3897, 291–306 (2005)Google Scholar
  4. 4.
    Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: CRYPTO2005, LNCS, vol. 3126, pp. 293–308. (2005)Google Scholar
  5. 5.
    Cao, T., Shen, P.: Cryptanalysis of some RFID authentication protocols. J. Commun. 3(7), 95–100 (2008)CrossRefGoogle Scholar
  6. 6.
    Juels, A.: Strengthening EPC tag against cloning. In: Acm Workshop on Wireless Security, pp. 67–76. (2005)Google Scholar
  7. 7.
    Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Ecrypt Workshop on RFID and Lightweight Crypto. (2005)Google Scholar
  8. 8.
    Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., Cheng, C.: A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5), 250–255 (2017)Google Scholar
  9. 9.
    Yeh, T.C., Wua, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34(3), 337–341 (2011)CrossRefGoogle Scholar
  10. 10.
    Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A. LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Workshop on RFID Security, p. 6. (2006)Google Scholar
  11. 11.
    Liu, Y.N., Cheng, C., Gu, T., Jiang, T., Li, X.: A lightweight authenticated communication scheme for smart grid. IEEE Sens. J. 16(3), 836–842 (2016)CrossRefGoogle Scholar
  12. 12.
    Li, T., Deng, R.H.: Vulnerability analysis of EMAP An efficient RFID mutual authentication protocol. In: International Conference on Availability, Reliability and Security, pp. 238–245. (2007)Google Scholar
  13. 13.
    Karthikeyan, S., Nesterenko, M.: RFID security without extensive cryptography. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67. (2005)Google Scholar
  14. 14.
    Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: ACM Conference on Computer & Communications Security, pp. 210-219, (2004)Google Scholar
  15. 15.
    Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues. Comput. Netw. 52(12), 2373–2380 (2008)CrossRefGoogle Scholar
  16. 16.
    Chien, H.Y.: Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Netw. 57(14), 2705–2717 (2013)CrossRefGoogle Scholar
  17. 17.
    Chien, H.Y., Laih, C.S.: ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J. Parallel Distrib. Comput. 69, 848–853 (2009)CrossRefGoogle Scholar
  18. 18.
    Godor, G., Imre, S.: Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In: IEEE International Conference on Rfid-technologies & Applications, pp. 386-393, (2011)Google Scholar
  19. 19.
    Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18(7), 133–146 (2014)CrossRefGoogle Scholar
  20. 20.
    Chien, H.: Y., Elliptic curve cryptography-based RFID authentication resisting active tracking. Wirel. Person. Commun. 94, 2925–2936 (2017)Google Scholar
  21. 21.
    Shamir, A.: How to share a secret. Commun. ACM. 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Obana, S.: Almost optimum \(t\)-cheater identifiable secret sharing schemes. In: EUROCRYPT2011, LNCS, vol. 6632, pp. 284–302. (2011)Google Scholar
  23. 23.
    Liu, Y.X.: Efficient \(t\)-cheater identifiable \((k, n)\) secret sharing scheme for \(t\le \lfloor \frac{k-2}{2}\rfloor \). IET Inf. Secur. 8(1), 37–41 (2014)CrossRefGoogle Scholar
  24. 24.
    Menezes, A.J.: Elliptic curve public key cryptosystems. J. Xian Min. Inst. 234, 112–131 (1999)Google Scholar
  25. 25.
    Tompa, M., Woll, H.: How to share a secret with cheaters. J. Cryptol. 1(3), 133–138 (1989)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringXi’an University of TechnologyXi’anChina

Personalised recommendations