An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment

被引:13
作者
Anandhi, S. [1 ]
Anitha, R. [1 ]
Sureshkumar, Venkatasamy [1 ]
机构
[1] PSG Coll Technol, Dept Appl Math & Computat Sci, Coimbatore 641004, Tamil Nadu, India
关键词
Object tracking; Multi tag; Mutual authentication protocol; Cloud storage; GNY logic; SECURITY; SYSTEM; SCHEME;
D O I
10.1007/s11277-020-07330-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In supply chain management applications, detection of a large object is made efficient by attaching multiple RFID tags in that object. Each part contains an RFID tag attached by the corresponding vendor. In order to check the availability of the object, it is compulsory to ensure all the parts are existing as well. The RFID tags can be interrogated by any reader deployed in the department. This approach enhances the object detection probability for each object but increases security and privacy risks. The communication between RFID readers and the tags in the same department is to be authenticated by preserving the privacy of both reader and the tag. Several researchers have developed variants of grouping protocol for authentication and for searching the tags. In this article, Shen et al.'s scheme for authenticating multiple tags in a group is analyzed and found that secret parameters are leaked in that scheme and it is not applicable for dynamic inclusion of tags. Also, an efficient authentication protocol for the multi-tag scenario to overcome the above mentioned issues is designed and analyzed in this paper. We propose an authentication protocol for communication between an object attached with multiple tags and RFID reader deployed in the department. We store the details about the object and its associated tags, and the readers in the cloud. Cloud storage provides scalability and anywhere anytime access. The communication between the reader and the cloud server is also authenticated. The proposed protocol is formally analyzed using GNY logic to prove the mutual authentication. Informal analysis proves the efficiency of the proposed protocol against known attacks. We also analyze our protocol using automatic cryptographic protocol verifier tool ProVerif version 1.96.
引用
收藏
页码:2339 / 2361
页数:23
相关论文
共 26 条
[1]   IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics [J].
Anandhi, S. ;
Anitha, R. ;
Sureshkumar, Venkatasamy .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (02) :543-560
[2]   An IoT Based Secure Object Tracking System [J].
Baruah, Barnana ;
Dhal, Subhasish .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (03) :1209-1242
[3]   Public-key cryptography for RFID-tags [J].
Batina, L. ;
Guajardo, J. ;
Kerins, T. ;
Mentens, N. ;
Tuyls, P. ;
Verbauwhede, I. .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, :217-+
[4]   Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs [J].
Batina, Lejla ;
Lee, Yong Ki ;
Seys, Stefaan ;
Singelee, Dave ;
Verbauwhede, Ingrid .
PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (03) :323-335
[5]  
Bolotnyy L., 2007, IWRT, P100
[6]   An efficient mutual authentication RFID scheme based on elliptic curve cryptography [J].
Chou, Jue-Sam .
JOURNAL OF SUPERCOMPUTING, 2014, 70 (01) :75-94
[7]  
Dhal S, 2014, 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), P668, DOI 10.1109/IndiaCom.2014.6828046
[9]   Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems - Performance Analysis by Simulations [J].
Godor, Gyozo ;
Giczi, Norbert ;
Imdr, Sandor .
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, :650-657
[10]  
Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854