Skip to main content
Log in

Efficient group authentication in RFID using secret sharing scheme

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Radio frequency identification (RFID) systems become more popular in recent years due to its low cost and high efficiency in identification. Authentication between tags and server is a key technology to protect the security of RFID systems. Most previous authentication approaches adopt hash functions or public cryptography, they need multiple rounds of communications between tags and sever. In this paper, we use threshold secret sharing scheme to propose a novel group authentication method in RFID. In our scheme, a group of tags can be authenticated by the sever with only need one-round communication, and the sever can identify the unqualified tags using the approach of cheater identification in secret sharing. The proposed authentication has efficient computation which is fit for RFID. More importantly, it can greatly reduce the cost of communication and also the risk of been attacked through the communication channel.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Michahelles, F., Thiesse, F., Schmidt, A., Williams, J.R.: Pervasive RFID and near field communication technology. IEEE Pervasive Comput. 6(3), 94–96 (2007)

    Article  Google Scholar 

  2. Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secur. Comput. 4(4), 337–340 (2007)

    Article  Google Scholar 

  3. Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. International Conference on Selected Areas in Cryptography, LNCS 3897, 291–306 (2005)

  4. Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: CRYPTO2005, LNCS, vol. 3126, pp. 293–308. (2005)

  5. Cao, T., Shen, P.: Cryptanalysis of some RFID authentication protocols. J. Commun. 3(7), 95–100 (2008)

    Article  Google Scholar 

  6. Juels, A.: Strengthening EPC tag against cloning. In: Acm Workshop on Wireless Security, pp. 67–76. (2005)

  7. Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Ecrypt Workshop on RFID and Lightweight Crypto. (2005)

  8. Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., Cheng, C.: A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5), 250–255 (2017)

    Google Scholar 

  9. Yeh, T.C., Wua, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34(3), 337–341 (2011)

    Article  Google Scholar 

  10. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A. LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Workshop on RFID Security, p. 6. (2006)

  11. Liu, Y.N., Cheng, C., Gu, T., Jiang, T., Li, X.: A lightweight authenticated communication scheme for smart grid. IEEE Sens. J. 16(3), 836–842 (2016)

    Article  Google Scholar 

  12. Li, T., Deng, R.H.: Vulnerability analysis of EMAP An efficient RFID mutual authentication protocol. In: International Conference on Availability, Reliability and Security, pp. 238–245. (2007)

  13. Karthikeyan, S., Nesterenko, M.: RFID security without extensive cryptography. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67. (2005)

  14. Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: ACM Conference on Computer & Communications Security, pp. 210-219, (2004)

  15. Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues. Comput. Netw. 52(12), 2373–2380 (2008)

    Article  Google Scholar 

  16. Chien, H.Y.: Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Netw. 57(14), 2705–2717 (2013)

    Article  Google Scholar 

  17. Chien, H.Y., Laih, C.S.: ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J. Parallel Distrib. Comput. 69, 848–853 (2009)

    Article  Google Scholar 

  18. Godor, G., Imre, S.: Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In: IEEE International Conference on Rfid-technologies & Applications, pp. 386-393, (2011)

  19. Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18(7), 133–146 (2014)

    Article  Google Scholar 

  20. Chien, H.: Y., Elliptic curve cryptography-based RFID authentication resisting active tracking. Wirel. Person. Commun. 94, 2925–2936 (2017)

  21. Shamir, A.: How to share a secret. Commun. ACM. 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  22. Obana, S.: Almost optimum \(t\)-cheater identifiable secret sharing schemes. In: EUROCRYPT2011, LNCS, vol. 6632, pp. 284–302. (2011)

  23. Liu, Y.X.: Efficient \(t\)-cheater identifiable \((k, n)\) secret sharing scheme for \(t\le \lfloor \frac{k-2}{2}\rfloor \). IET Inf. Secur. 8(1), 37–41 (2014)

    Article  Google Scholar 

  24. Menezes, A.J.: Elliptic curve public key cryptosystems. J. Xian Min. Inst. 234, 112–131 (1999)

    Google Scholar 

  25. Tompa, M., Woll, H.: How to share a secret with cheaters. J. Cryptol. 1(3), 133–138 (1989)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The research presented in this paper is supported in part by the China National Natural Science Foundation (No.: 61502384, 61571360, 61602374, 61602376, 61702411), Shaanxi Science and Technology Co-ordination and Innovation Project (No.: 2016KTZDGY05-09), and the Innovation Project of Shaanxi Provincial Department of Education (No.: 17JF023).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanxiao Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Sun, Q., Wang, Y. et al. Efficient group authentication in RFID using secret sharing scheme. Cluster Comput 22 (Suppl 4), 8605–8611 (2019). https://doi.org/10.1007/s10586-018-1929-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1929-1

Keywords

Navigation