Cloud-based lightweight secure RFID mutual authentication protocol in IoT

被引:55
作者
Fan, Kai [1 ]
Luo, Qi [1 ]
Zhang, Kuan [2 ]
Yang, Yintang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ Nebraska, Dept Elect & Comp Engn, Lincoln, NE 68588 USA
[3] Xidian Univ, Minist Educ Wide Band Gap Semicond Mat & Devices, Key Lab, Xian 710071, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Internet of things; Lightweight; Security and privacy; RFID; Mutual authentication;
D O I
10.1016/j.ins.2019.08.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) is a supporting technology for the Internet of things (IoT). RFID enables all physical devices to be connected to IoT. When RFID is widely used and developing rapidly, its security and privacy issues cannot be ignored. The wireless broadcast channel between the tag and the reader may be subject to many security attacks, such as interception, modification, and replay. Messages from unverified tags or readers are also untrustworthy. A secure and stable RFID authentication scheme is critical to IoT. This paper puts forward an efficient and reliable cloud-based RFID authentication scheme. In order to reduce the RFID tag's overhead, the proposed authentication scheme explores the rotation and enhanced permutation to encrypt data. The proposed protocol not only resists the above common attacks and protects the privacy of the tag, but also adds the cloud server to the RFID system. Performance simulation shows that permutation and rotation are efficient. Security analysis shows that our protocol can resist various attacks, such as tracking, replay, and desynchronization attack. Mutual authentication and backward security are also achieved. Finally, we apply BAN logic to prove the security of the protocol. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:329 / 340
页数:12
相关论文
共 25 条
[1]  
Abughazalah S., 2015, DATA PRIVACY MANAGEM, P47
[2]  
[Anonymous], J SOFTW
[3]  
[Anonymous], 2003, SECURITY PROTOCOL TH
[4]  
[Anonymous], 2003, RSA Laboratories Cryptobytes
[5]  
[Anonymous], 2008, NETWORK SECURITY PRO
[6]  
[Anonymous], J U ELECT SCI TECHNO
[7]   RFID tag search protocol preserving privacy of mobile reader holders [J].
Chuna, Ji Young ;
Hwang, Jung Yeon ;
Lee, Dong Hoon .
IEICE ELECTRONICS EXPRESS, 2011, 8 (02) :50-56
[8]   Cloud-based Lightweight RFID Mutual Authentication Protocol [J].
Fan, Kai ;
Luo, Qi ;
Li, Hui ;
Yang, Yintang .
2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, :333-338
[9]   Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G [J].
Fan, Kai ;
Gong, Yuanyuan ;
Liang, Chen ;
Li, Hui ;
Yang, Yintang .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3095-3104
[10]  
Feng Deng-Guo, 2005, Journal of Software, V16, P1743, DOI 10.1360/jos161743