Double verification protocol via secret sharing for low-cost RFID tags
RFID tags have become ubiquitous and cheaper to implement. It is often imperative to design ultralightweight authentication protocols for such tags. Many existing protocols still rely on triangular functions, which have been shown to have security and privacy vulnerabilities. This work proposes UMAP...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/100613 http://hdl.handle.net/10220/48553 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-100613 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1006132023-02-28T19:41:16Z Double verification protocol via secret sharing for low-cost RFID tags Liu, Yali Ezerman, Martianus Frederic Wang, Huaxiong School of Physical and Mathematical Sciences Low-cost RFID DRNTU::Science::Mathematics RFID tags have become ubiquitous and cheaper to implement. It is often imperative to design ultralightweight authentication protocols for such tags. Many existing protocols still rely on triangular functions, which have been shown to have security and privacy vulnerabilities. This work proposes UMAPSS, an ultralightweight mutual-authentication protocol based on Shamir’s (2, n) secret sharing. It includes mechanisms for double verification, session control, mutual authentication, and dynamic update to enhance security and provide a robust privacy protection. The protocol relies only on two simple bitwise operations, namely addition modulo 2m and a circular shift Rot(x, y), on the tag’s end. It avoids other, unbalanced, triangular operations. A security analysis shows that the protocol has excellent privacy properties while offering a robust defense against a broad range of typical attacks. It satisfies common security and the low-cost requirements for RFID tags. It is competitive against existing protocol, scoring favourably in terms of computational cost, storage requirement, and communication overhead MOE (Min. of Education, S’pore) Accepted version 2019-06-06T03:03:44Z 2019-12-06T20:25:22Z 2019-06-06T03:03:44Z 2019-12-06T20:25:22Z 2018 Journal Article Liu, Y., Ezerman, M. F., & Wang, H. (2019). Double verification protocol via secret sharing for low-cost RFID tags. Future Generation Computer Systems, 90, 118-128. doi:10.1016/j.future.2018.07.004 0167-739X https://hdl.handle.net/10356/100613 http://hdl.handle.net/10220/48553 10.1016/j.future.2018.07.004 en Future Generation Computer Systems © 2018 Elsevier B.V. All rights reserved. This paper was published in Future Generation Computer Systems and is made available with permission of Elsevier B.V. 23 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Low-cost RFID DRNTU::Science::Mathematics |
spellingShingle |
Low-cost RFID DRNTU::Science::Mathematics Liu, Yali Ezerman, Martianus Frederic Wang, Huaxiong Double verification protocol via secret sharing for low-cost RFID tags |
description |
RFID tags have become ubiquitous and cheaper to implement. It is often imperative to design ultralightweight authentication protocols for such tags. Many existing protocols still rely on triangular functions, which have been shown to have security and privacy vulnerabilities. This work proposes UMAPSS, an ultralightweight mutual-authentication protocol based on Shamir’s (2, n) secret sharing. It includes mechanisms for double verification, session control, mutual authentication, and dynamic update to enhance security and provide a robust privacy protection. The protocol relies only on two simple bitwise operations, namely addition modulo 2m and a circular shift Rot(x, y), on the tag’s end. It avoids other, unbalanced, triangular operations. A security analysis shows that the protocol has excellent privacy properties while offering a robust defense against a broad range of typical attacks. It satisfies common security and the low-cost requirements for RFID tags. It is competitive against existing protocol, scoring favourably in terms of computational cost, storage requirement, and communication overhead |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Liu, Yali Ezerman, Martianus Frederic Wang, Huaxiong |
format |
Article |
author |
Liu, Yali Ezerman, Martianus Frederic Wang, Huaxiong |
author_sort |
Liu, Yali |
title |
Double verification protocol via secret sharing for low-cost RFID tags |
title_short |
Double verification protocol via secret sharing for low-cost RFID tags |
title_full |
Double verification protocol via secret sharing for low-cost RFID tags |
title_fullStr |
Double verification protocol via secret sharing for low-cost RFID tags |
title_full_unstemmed |
Double verification protocol via secret sharing for low-cost RFID tags |
title_sort |
double verification protocol via secret sharing for low-cost rfid tags |
publishDate |
2019 |
url |
https://hdl.handle.net/10356/100613 http://hdl.handle.net/10220/48553 |
_version_ |
1759855886354874368 |