Double verification protocol via secret sharing for low-cost RFID tags

RFID tags have become ubiquitous and cheaper to implement. It is often imperative to design ultralightweight authentication protocols for such tags. Many existing protocols still rely on triangular functions, which have been shown to have security and privacy vulnerabilities. This work proposes UMAP...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu, Yali, Ezerman, Martianus Frederic, Wang, Huaxiong
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/100613
http://hdl.handle.net/10220/48553
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-100613
record_format dspace
spelling sg-ntu-dr.10356-1006132023-02-28T19:41:16Z Double verification protocol via secret sharing for low-cost RFID tags Liu, Yali Ezerman, Martianus Frederic Wang, Huaxiong School of Physical and Mathematical Sciences Low-cost RFID DRNTU::Science::Mathematics RFID tags have become ubiquitous and cheaper to implement. It is often imperative to design ultralightweight authentication protocols for such tags. Many existing protocols still rely on triangular functions, which have been shown to have security and privacy vulnerabilities. This work proposes UMAPSS, an ultralightweight mutual-authentication protocol based on Shamir’s (2, n) secret sharing. It includes mechanisms for double verification, session control, mutual authentication, and dynamic update to enhance security and provide a robust privacy protection. The protocol relies only on two simple bitwise operations, namely addition modulo 2m and a circular shift Rot(x, y), on the tag’s end. It avoids other, unbalanced, triangular operations. A security analysis shows that the protocol has excellent privacy properties while offering a robust defense against a broad range of typical attacks. It satisfies common security and the low-cost requirements for RFID tags. It is competitive against existing protocol, scoring favourably in terms of computational cost, storage requirement, and communication overhead MOE (Min. of Education, S’pore) Accepted version 2019-06-06T03:03:44Z 2019-12-06T20:25:22Z 2019-06-06T03:03:44Z 2019-12-06T20:25:22Z 2018 Journal Article Liu, Y., Ezerman, M. F., & Wang, H. (2019). Double verification protocol via secret sharing for low-cost RFID tags. Future Generation Computer Systems, 90, 118-128. doi:10.1016/j.future.2018.07.004 0167-739X https://hdl.handle.net/10356/100613 http://hdl.handle.net/10220/48553 10.1016/j.future.2018.07.004 en Future Generation Computer Systems © 2018 Elsevier B.V. All rights reserved. This paper was published in Future Generation Computer Systems and is made available with permission of Elsevier B.V. 23 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Low-cost
RFID
DRNTU::Science::Mathematics
spellingShingle Low-cost
RFID
DRNTU::Science::Mathematics
Liu, Yali
Ezerman, Martianus Frederic
Wang, Huaxiong
Double verification protocol via secret sharing for low-cost RFID tags
description RFID tags have become ubiquitous and cheaper to implement. It is often imperative to design ultralightweight authentication protocols for such tags. Many existing protocols still rely on triangular functions, which have been shown to have security and privacy vulnerabilities. This work proposes UMAPSS, an ultralightweight mutual-authentication protocol based on Shamir’s (2, n) secret sharing. It includes mechanisms for double verification, session control, mutual authentication, and dynamic update to enhance security and provide a robust privacy protection. The protocol relies only on two simple bitwise operations, namely addition modulo 2m and a circular shift Rot(x, y), on the tag’s end. It avoids other, unbalanced, triangular operations. A security analysis shows that the protocol has excellent privacy properties while offering a robust defense against a broad range of typical attacks. It satisfies common security and the low-cost requirements for RFID tags. It is competitive against existing protocol, scoring favourably in terms of computational cost, storage requirement, and communication overhead
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Liu, Yali
Ezerman, Martianus Frederic
Wang, Huaxiong
format Article
author Liu, Yali
Ezerman, Martianus Frederic
Wang, Huaxiong
author_sort Liu, Yali
title Double verification protocol via secret sharing for low-cost RFID tags
title_short Double verification protocol via secret sharing for low-cost RFID tags
title_full Double verification protocol via secret sharing for low-cost RFID tags
title_fullStr Double verification protocol via secret sharing for low-cost RFID tags
title_full_unstemmed Double verification protocol via secret sharing for low-cost RFID tags
title_sort double verification protocol via secret sharing for low-cost rfid tags
publishDate 2019
url https://hdl.handle.net/10356/100613
http://hdl.handle.net/10220/48553
_version_ 1759855886354874368