Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure

被引:11
作者
Alzahrani, Bander A. [1 ]
Mahmood, Khalid [2 ]
Kumari, Saru [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
[2] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
Drugs; Protocols; Authentication; Radiofrequency identification; Mobile handsets; Servers; Authentication protocols; near-field communication; anti-counterfeiting; counterfeit medicines; radio frequency identification; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; EFFICIENT;
D O I
10.1109/ACCESS.2020.2989305
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Counterfeit medications are known as the medications that were manufactured for the purpose of deceptively representing as authentic, effective and original in the market. Such medications cause severe health issues for patients. Counterfeited drugs have an inimical effect on the human health. The legal manufacturing companies also face threats to their revenue loss due to these counterfeited medicines. In this paper, we introduce a novel authentication protocol for anti-counterfeited drugs systems based on Internet of Things (IoT) to help checking the validity of drugs "unit dosage". Our protocol uses the near-field communication (NFC) as it is convenient for mobile environment. The protocol also offers reliable update phase for NFC. Furthermore, our scheme is complemented with performance evaluation along with the use of random oracle model for formal security analysis. We also evaluate our protocol broadly using Py-Charm tool. Results show that proposed protocol resists most of common related flaws almost in equal computing cost with more added security features.
引用
收藏
页码:76357 / 76367
页数:11
相关论文
共 37 条
[1]  
[Anonymous], 2008, LANCET, V371, P1551, DOI 10.1016/S0140-6736(08)60663-7
[2]   Public-key cryptography for RFID-tags [J].
Batina, L. ;
Guajardo, J. ;
Kerins, T. ;
Mentens, N. ;
Tuyls, P. ;
Verbauwhede, I. .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, :217-+
[3]  
Blass E.-O., 2011, P NDSS 18 ANN NETW D
[4]   New ways to pay [J].
Bodhani, Aasha .
Engineering and Technology, 2013, 8 (07) :32-35
[5]  
Burns W, 2006, B WORLD HEALTH ORGAN, V84, P689
[6]   Implementation issues in RFID-based anti-counterfeiting systems [J].
Cheung, H. H. ;
Choi, S. H. .
COMPUTERS IN INDUSTRY, 2011, 62 (07) :708-718
[7]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259
[8]  
Chin-Ling Chen, 2012, 2012 International Symposium on Computer, Consumer and Control (IS3C 2012), P419, DOI 10.1109/IS3C.2012.112
[9]  
Choi S., 2008, IAENG INT J COMPUTER, V35, P1
[10]   RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting [J].
Choi, S. H. ;
Yang, B. ;
Cheung, H. H. ;
Yang, Y. X. .
COMPUTERS IN INDUSTRY, 2015, 68 :148-161