Towards secure authenticating of cache in the reader for RFID-based IoT systems

被引:44
作者
Li, Chun-Ta [1 ]
Lee, Cheng-Chi [2 ,3 ]
Weng, Chi-Yao [4 ]
Chen, Chien-Ming [5 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, 529 Zhongzheng Rd, Tainan 71002, Taiwan
[2] Fu Jen Catholic Univ, Dept Lib & Informat Sci, 510 Jhongjheng Rd, New Taipei 24205, Taiwan
[3] Asia Univ, Dept Photon & Commun Engn, 500 Lioufeng Rd, Taichung 41354, Taiwan
[4] Natl Pingtung Univ, Dept Comp Sci, 4-18 Min Sheng Rd, Pingtung 90003, Taiwan
[5] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
关键词
Authentication; Cryptanalysis; Internet of things; Radio frequency identification; Security; OWNERSHIP TRANSFER; INTERNET; PRIVACY; THINGS;
D O I
10.1007/s12083-017-0564-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of radio frequency identification (RFID) in Internet of things (IoT) has led to a significant progress in numerous intelligent devices. However, due to its restrictions on computation ability, storage space and battery capacity, RFID-based IoT system has to confront with various security and efficiency challenges. Recently, a lightweight RFID mutual authentication protocol with cache in the reader is introduced by Fan et al., named LRMAPC. Fan et al.'s LRMAPC can achieve stronger security and privacy requirements and reduce the computation and storage overheads during authentication process. Unfortunately, we discover that Fan et al.'s LRMAPC is susceptible to reader impersonation attack, tag forgery attack and message eavesdropping attack. Besides, it fails to preserve mutual authentication between the reader and the database. In order to remedy these flaws mentioned above, we further present an advanced authentication mechanisms and demonstrate the correctness of the advanced LRMAPC through the Gong-Needham-Yahalom (GNY) logic analysis. Compared the security and efficiency with Fan et al.'s LRMAPC, the advanced LRMAPC satisfies desirable security requirements and maintains acceptable efficiency in terms of the costs of storage space and computation time. As a result, our advanced LRMAPC is a very promising solution for resource-constrained devices in RFID-based IoT systems.
引用
收藏
页码:198 / 208
页数:11
相关论文
共 29 条
  • [1] [Anonymous], 2104 RFC HMAC
  • [2] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [3] Privacy-Preserving Channel Access for Internet of Things
    Banerjee, Debasmit
    Dong, Bo
    Taghizadeh, Mahmoud
    Biswas, Subir
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 430 - 445
  • [4] Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    Cho, Jung-Sik
    Yeo, Sang-Soo
    Kim, Sung Kwon
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 391 - 397
  • [5] Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags
    Dimitriou, Tassos
    [J]. AD HOC NETWORKS, 2016, 37 : 195 - 208
  • [6] Secure Communication with RFID tags in the Internet of Things
    Dominikus, Sandra
    Kraxberger, Stefan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2639 - 2653
  • [7] An ultra-lightweight RFID authentication scheme for mobile commerce
    Fan, Kai
    Ge, Nan
    Gong, Yuanyuan
    Li, Hui
    Su, Ruidan
    Yang, Yintang
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (02) : 368 - 376
  • [8] Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G
    Fan, Kai
    Gong, Yuanyuan
    Liang, Chen
    Li, Hui
    Yang, Yintang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3095 - 3104
  • [9] LRMAPC: a lightweight RFID mutual authentication protocol with cache in the reader for IoT
    Fan, Kai
    Liang, Chen
    Li, Hui
    Yang, Yintang
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 276 - 280
  • [10] Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854