Abstract
Radio frequency identification (RFID) systems become more popular in recent years due to its low cost and high efficiency in identification. Authentication between tags and server is a key technology to protect the security of RFID systems. Most previous authentication approaches adopt hash functions or public cryptography, they need multiple rounds of communications between tags and sever. In this paper, we use threshold secret sharing scheme to propose a novel group authentication method in RFID. In our scheme, a group of tags can be authenticated by the sever with only need one-round communication, and the sever can identify the unqualified tags using the approach of cheater identification in secret sharing. The proposed authentication has efficient computation which is fit for RFID. More importantly, it can greatly reduce the cost of communication and also the risk of been attacked through the communication channel.
Similar content being viewed by others
References
Michahelles, F., Thiesse, F., Schmidt, A., Williams, J.R.: Pervasive RFID and near field communication technology. IEEE Pervasive Comput. 6(3), 94–96 (2007)
Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secur. Comput. 4(4), 337–340 (2007)
Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. International Conference on Selected Areas in Cryptography, LNCS 3897, 291–306 (2005)
Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: CRYPTO2005, LNCS, vol. 3126, pp. 293–308. (2005)
Cao, T., Shen, P.: Cryptanalysis of some RFID authentication protocols. J. Commun. 3(7), 95–100 (2008)
Juels, A.: Strengthening EPC tag against cloning. In: Acm Workshop on Wireless Security, pp. 67–76. (2005)
Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Ecrypt Workshop on RFID and Lightweight Crypto. (2005)
Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., Cheng, C.: A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5), 250–255 (2017)
Yeh, T.C., Wua, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34(3), 337–341 (2011)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A. LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Workshop on RFID Security, p. 6. (2006)
Liu, Y.N., Cheng, C., Gu, T., Jiang, T., Li, X.: A lightweight authenticated communication scheme for smart grid. IEEE Sens. J. 16(3), 836–842 (2016)
Li, T., Deng, R.H.: Vulnerability analysis of EMAP An efficient RFID mutual authentication protocol. In: International Conference on Availability, Reliability and Security, pp. 238–245. (2007)
Karthikeyan, S., Nesterenko, M.: RFID security without extensive cryptography. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67. (2005)
Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: ACM Conference on Computer & Communications Security, pp. 210-219, (2004)
Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues. Comput. Netw. 52(12), 2373–2380 (2008)
Chien, H.Y.: Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Netw. 57(14), 2705–2717 (2013)
Chien, H.Y., Laih, C.S.: ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J. Parallel Distrib. Comput. 69, 848–853 (2009)
Godor, G., Imre, S.: Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In: IEEE International Conference on Rfid-technologies & Applications, pp. 386-393, (2011)
Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18(7), 133–146 (2014)
Chien, H.: Y., Elliptic curve cryptography-based RFID authentication resisting active tracking. Wirel. Person. Commun. 94, 2925–2936 (2017)
Shamir, A.: How to share a secret. Commun. ACM. 22(11), 612–613 (1979)
Obana, S.: Almost optimum \(t\)-cheater identifiable secret sharing schemes. In: EUROCRYPT2011, LNCS, vol. 6632, pp. 284–302. (2011)
Liu, Y.X.: Efficient \(t\)-cheater identifiable \((k, n)\) secret sharing scheme for \(t\le \lfloor \frac{k-2}{2}\rfloor \). IET Inf. Secur. 8(1), 37–41 (2014)
Menezes, A.J.: Elliptic curve public key cryptosystems. J. Xian Min. Inst. 234, 112–131 (1999)
Tompa, M., Woll, H.: How to share a secret with cheaters. J. Cryptol. 1(3), 133–138 (1989)
Acknowledgements
The research presented in this paper is supported in part by the China National Natural Science Foundation (No.: 61502384, 61571360, 61602374, 61602376, 61702411), Shaanxi Science and Technology Co-ordination and Innovation Project (No.: 2016KTZDGY05-09), and the Innovation Project of Shaanxi Provincial Department of Education (No.: 17JF023).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, Y., Sun, Q., Wang, Y. et al. Efficient group authentication in RFID using secret sharing scheme. Cluster Comput 22 (Suppl 4), 8605–8611 (2019). https://doi.org/10.1007/s10586-018-1929-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-1929-1