Abstract

Abstract Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI) with Secure Multi-party Communication (SMC), a Forward-Secure Grouping-Proof Protocol (FSGP) for multiple RFID tags based on Shamir's (n, n) secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, wh...

Highlights

  • With the wide spread of RFID tags and its chea p implementations, the need for providing secure and privacy-preserving authentication protocols in extremely resource-constrained environments is evident

  • Different from the common techniques of Computational Intelligence (CI) that is addressed above, we focus on the applications of CI into this rapidly growing area of grouping-proof protocols for RFID tag s by combing CI with Secu re Multi-party Communication (SMC)

  • Reduce the computation costs and avoid order-dependent, we propose a forwardsecure grouping-proof protocol for multiple RFID tag s based on Shamir’s (n, n)-SS, which is the new application of co mbing CI with Secure Multiparty Communication (SMC) to construct Grouping-proof protocol

Read more

Summary

Introduction

With the wide spread of RFID tags and its chea p implementations, the need for providing secure and privacy-preserving authentication protocols in extremely resource-constrained environments is evident. The proof can be verified by a verifier which holds all the secret keys of tags He e xtended this notion and envisioned the concept of grouping-proofs[2,3,4], which allows multiple RFID tags to provide evidence that they are scanned simultaneously in an i dentification session by one or more readers within its broadcast range. Computational intelligence (CI) has been successfully used in recent years to address various challenges such as data aggregation, security, optimal deployment and localization, which brings about broad applicability, flexibility, self o ptimization capability and robustness against malicious attacks in dynamic environments. We propose a lightweight forward-secure groupingproof protocol based on Shamir’s (n, n) secret sharing to improve scalability, robustness, especially orderindependence by avoiding relaying message.

Review of existing protocols
Common weakness of existing RFID Groupingproofs
RFID Deployments and Assumption6
Our Protocol FSGP
Notations
Validity Authentication Phase
Legitimacy Authentication Phase
The result of Legitimacy Authentication Phase is described as follows:
Evaluation
Performance analysis
Security comparison
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.