Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing

被引:7
作者
Shariq, Mohd [1 ,2 ]
Conti, Mauro [3 ]
Singh, Karan [4 ]
Lal, Chhagan [5 ]
Das, Ashok Kumar [6 ,7 ]
Chaudhry, Shehzad Ashraf [8 ,9 ]
Masud, Mehedi [10 ]
机构
[1] Sharda Univ, Dept Comp Sci & Engn, Greater Noida 201310, India
[2] United Arab Emirates Univ, Coll Informat Technol, Dept Informat Syst & Secur, Abu Dhabi, U Arab Emirates
[3] Univ Padua, Dept Math, I-35131 Padua, Italy
[4] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi 110067, India
[5] NTNU, Dept Informat Secur & Commun Technol, Gjovik, Norway
[6] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[7] Korea Univ, Coll Informat, Dept Comp Sci & Engn, 145 Anam Ro, Seoul 02841, South Korea
[8] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[9] Nisantasi Univ, Fac Engn & Architecture, Dept Software Engn, Istanbul, Turkiye
[10] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, POB 11099, Taif 21944, Saudi Arabia
关键词
Big data; Authentication; IoT; RFID; Cloud computing; Scyther tool; PROTOCOL; LIGHTWEIGHT; SIMULATION; EFFICIENT;
D O I
10.1016/j.comnet.2024.110678
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuing growth in various research domains such as Artificial Intelligence (AI), Machine Learning (ML), Big Data Analytics (BDA), and Cloud Computing (CC), the Internet of Things (IoT) has become a popular technology nowadays. It provides a virtual interaction between physical objects and the cyber world over the Internet without human intervention. The IoT devices are embedded with sensors, software, or some other useful technologies for connecting, sharing, and exchanging data with other devices. Among recent technologies impacting human lives, Radio Frequency IDentification (RFID) has become a core identification technology that can be integrated into the IoT environments which connect billions of things or objects. However, an RFID system has two major issues: (i) an adversary can tamper or intercept the sensitive information of the RFID tags, which may cause forgery and privacy problems, and (ii) RFID tags have limited computational power capability which makes it challenging to use current security solutions. To deal with these issues, we propose an anonymous and reliable ultralightweight RFID-enabled authentication scheme (namely AnonR2AS) R 2 AS) for IoT systems in a cloud computing environment. AnonR2AS R 2 AS integrates bitwise exclusive-OR, left-right rotations, and ultralightweight half- flip operation, to reduce computational overheads on tag. The AnonR2AS R 2 AS provides stronger security (by preventing several attacks) and improves performance concerning low computational, communication, and storage costs. Also, it preserves information privacy and tags untraceability property by using Vaudenay privacy model. The Scyther simulation tool verification has been performed for its formal security analysis. The performance analysis ensures our AnonR2AS R 2 AS scheme is preferable for low-cost RFID systems.
引用
收藏
页数:14
相关论文
共 40 条
[31]   A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment [J].
Shariq, Mohd ;
Singh, Karan .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (08) :8532-8562
[32]   Enabling next-generation RFID applications: Solutions and challenges [J].
Sheng, Quan Z. ;
Li, Xue ;
Zeadally, Sherali .
COMPUTER, 2008, 41 (09) :21-+
[33]  
Surekha B, 2016, IEEE CONF CLOUD COMP, P54, DOI [10.1109/CCEM.2016.17, 10.1109/CCEM.2016.018]
[34]  
Vaudenay S, 2007, LECT NOTES COMPUT SC, V4833, P68
[35]  
Wei Z., 2013, P INT C EL COMM NETW, P196
[36]  
Wentao Liu, 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), P1216, DOI 10.1109/CECNet.2012.6202020
[37]  
Xiao HN, 2016, IEEE TRUST BIG, P332, DOI [10.1109/TrustCom.2016.0081, 10.1109/TrustCom.2016.80]
[38]  
Xiaolin Jia, 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), P1282, DOI 10.1109/CECNet.2012.6201508
[39]  
Xie W, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), P168, DOI 10.1109/RFID.2013.6548151
[40]  
Zaslavsky A, 2013, Arxiv, DOI arXiv:1301.0159