Double verification protocol via secret sharing for low-cost RFID tags

被引:12
作者
Liu, Y. [1 ]
Ezerman, M. F. [2 ]
Wang, H. [3 ]
机构
[1] Jiangsu Normal Univ, Coll Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
[2] Nanyang Technol Univ, Sch Phys & Math Sci, 21 Nanyang Link, Singapore, Singapore
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, 21 Nanyang Link, Singapore, Singapore
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 90卷
基金
中国国家自然科学基金;
关键词
RFID; Low-cost; Mutual authentication; Secret sharing; Ultralightweight; AUTHENTICATION PROTOCOL; SECURITY; PRIVACY;
D O I
10.1016/j.future.2018.07.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RFID tags have become ubiquitous and cheaper to implement. It is often imperative to design ultralightweight authentication protocols for such tags. Many existing protocols still rely on triangular functions, which have been shown to have security and privacy vulnerabilities. This work proposes UMAPSS, an ultralightweight mutual-authentication protocol based on Shamir's (2, n) secret sharing. It includes mechanisms for double verification, session control, mutual authentication, and dynamic update to enhance security and provide a robust privacy protection. The protocol relies only on two simple bitwise operations, namely addition modulo 2(m) and a circular shift Rot(x, y), on the tag's end. It avoids other, unbalanced, triangular operations. A security analysis shows that the protocol has excellent privacy properties while offering a robust defense against a broad range of typical attacks. It satisfies common security and the low-cost requirements for RFID tags. It is competitive against existing protocol, scoring favourably in terms of computational cost, storage requirement, and communication overhead. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:118 / 128
页数:11
相关论文
共 48 条
[1]   Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains [J].
Abughazalah, Sarah ;
Markantonakis, Kostantinos ;
Mayes, Keith .
2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, :871-878
[2]  
Alshehri A, 2013, PROC INT WORK NEAR, P25
[3]  
[Anonymous], 2012, P 2012 IEEE 11 INT C
[4]  
[Anonymous], 2003, THESIS
[5]   Low-cost Implementations of NTRU for pervasive security [J].
Atici, Ali Can ;
Batina, Lejla ;
Fan, Junfeng ;
Verbauwhede, Ingrid ;
Yalcin, S. Berna Oers .
2008 INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2008, :79-+
[6]   Pitfalls in Ultralightweight Authentication Protocol Designs [J].
Avoine, Gildas ;
Carpent, Xavier ;
Hernandez-Castro, Julio .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (09) :2317-2332
[7]   Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography [J].
Avoine, Gildas ;
Bingol, Muhammed Ali ;
Carpent, Xavier ;
Yalcin, Siddika Berna Ors .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (10) :2037-2049
[8]  
Barasz M., 2007, P 1 INT EURASIP WORK, P37
[9]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[10]  
Bono SC, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P1