Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing

被引:7
作者
Shariq, Mohd [1 ,2 ]
Conti, Mauro [3 ]
Singh, Karan [4 ]
Lal, Chhagan [5 ]
Das, Ashok Kumar [6 ,7 ]
Chaudhry, Shehzad Ashraf [8 ,9 ]
Masud, Mehedi [10 ]
机构
[1] Sharda Univ, Dept Comp Sci & Engn, Greater Noida 201310, India
[2] United Arab Emirates Univ, Coll Informat Technol, Dept Informat Syst & Secur, Abu Dhabi, U Arab Emirates
[3] Univ Padua, Dept Math, I-35131 Padua, Italy
[4] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi 110067, India
[5] NTNU, Dept Informat Secur & Commun Technol, Gjovik, Norway
[6] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[7] Korea Univ, Coll Informat, Dept Comp Sci & Engn, 145 Anam Ro, Seoul 02841, South Korea
[8] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[9] Nisantasi Univ, Fac Engn & Architecture, Dept Software Engn, Istanbul, Turkiye
[10] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, POB 11099, Taif 21944, Saudi Arabia
关键词
Big data; Authentication; IoT; RFID; Cloud computing; Scyther tool; PROTOCOL; LIGHTWEIGHT; SIMULATION; EFFICIENT;
D O I
10.1016/j.comnet.2024.110678
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuing growth in various research domains such as Artificial Intelligence (AI), Machine Learning (ML), Big Data Analytics (BDA), and Cloud Computing (CC), the Internet of Things (IoT) has become a popular technology nowadays. It provides a virtual interaction between physical objects and the cyber world over the Internet without human intervention. The IoT devices are embedded with sensors, software, or some other useful technologies for connecting, sharing, and exchanging data with other devices. Among recent technologies impacting human lives, Radio Frequency IDentification (RFID) has become a core identification technology that can be integrated into the IoT environments which connect billions of things or objects. However, an RFID system has two major issues: (i) an adversary can tamper or intercept the sensitive information of the RFID tags, which may cause forgery and privacy problems, and (ii) RFID tags have limited computational power capability which makes it challenging to use current security solutions. To deal with these issues, we propose an anonymous and reliable ultralightweight RFID-enabled authentication scheme (namely AnonR2AS) R 2 AS) for IoT systems in a cloud computing environment. AnonR2AS R 2 AS integrates bitwise exclusive-OR, left-right rotations, and ultralightweight half- flip operation, to reduce computational overheads on tag. The AnonR2AS R 2 AS provides stronger security (by preventing several attacks) and improves performance concerning low computational, communication, and storage costs. Also, it preserves information privacy and tags untraceability property by using Vaudenay privacy model. The Scyther simulation tool verification has been performed for its formal security analysis. The performance analysis ensures our AnonR2AS R 2 AS scheme is preferable for low-cost RFID systems.
引用
收藏
页数:14
相关论文
共 40 条
[1]  
Abughazalah S, 2015, LECT NOTES COMPUT SC, V8872, P147, DOI [10.1007/978-3-319-17016-9-10, 10.1007/978-3-319-17016-9_10]
[2]  
Adeli M., 2021, IACR Cryptol. ePrint Arch., V2021, P144
[3]   SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT [J].
Aghili, Seyed Farhad ;
Mala, Hamid ;
Kaliyar, Pallavi ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 :621-634
[4]   A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance [J].
Akram, Muhammad Wahid ;
Bashir, Ali Kashif ;
Shamshad, Salman ;
Saleem, Muhammad Asad ;
AlZubi, Ahmad Ali ;
Chaudhry, Shehzad Ashraf ;
Alzahrani, Bander A. ;
Bin Zikria, Yousaf .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) :19634-19643
[5]  
Al-Emran M., 2020, Toward social internet of things (SIoT): enabling technologies, architectures and applications, P197
[6]   Simulation-Based Traceability Analysis of RFID Authentication Protocols [J].
Alagheband, Mahdi R. ;
Aref, Mohammad R. .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (02) :1019-1038
[7]   A hierarchical key management and authentication method for wireless sensor networks [J].
Alimoradi, Pourya ;
Barati, Ali ;
Barati, Hamid .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (06)
[8]   An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment [J].
Anandhi, S. ;
Anitha, R. ;
Sureshkumar, Venkatasamy .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) :2339-2361
[9]   An Authentication-Based Secure Data Aggregation Method in Internet of Things [J].
Ataei Nezhad, Maryam ;
Barati, Hamid ;
Barati, Ali .
JOURNAL OF GRID COMPUTING, 2022, 20 (03)
[10]   RDTP: reliable data transport protocol in wireless sensor networks [J].
Barati, Ali ;
Movaghar, Ali ;
Sabaei, Masoud .
TELECOMMUNICATION SYSTEMS, 2016, 62 (03) :611-623