Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains

被引:83
作者
Sidorov, Michail [1 ]
Ong, Ming Tze [2 ]
Sridharan, Ravivarma Vikneswaren [3 ]
Nakamura, Junya [1 ]
Ohmura, Ren [1 ]
Khor, Jing Huey [4 ]
机构
[1] Toyohashi Univ Technol, Dept Comp Sci & Engn, Toyohashi, Aichi 4418580, Japan
[2] Univ Southampton Malaysia, Dept Engn Fdn, Nusajaya 79200, Malaysia
[3] Univ Southampton, Sch Elect & Comp Sci, Southampton SO17 1BJ, Hants, England
[4] Univ Southampton Malaysia, Sch Elect & Comp Sci, Nusajaya 79200, Malaysia
关键词
Blockchain; distributed ledger technology; radio frequency identification; LIGHTWEIGHT; EFFICIENT; INTERNET;
D O I
10.1109/ACCESS.2018.2890389
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Previous research studies mostly focused on enhancing the security of radio frequency identification (RFID) protocols for various RFID applications that rely on a centralized database. However, blockchain technology is quickly emerging as a novel distributed and decentralized alternative that provides higher data protection, reliability, immutability, transparency, and lower management costs compared with a conventional centralized database. These properties make it extremely suitable for integration in a supply chain management system. In order to successfully fuse RFID and blockchain technologies together, a secure method of communication is required between the RFID tagged goods and the blockchain nodes. Therefore, this paper proposes a robust ultra-lightweight mutual authentication RFID protocol that works together with a decentralized database to create a secure blockchain-enabled supply chain management system. Detailed security analysis is performed to prove that the proposed protocol is secure from key disclosure, replay, man-in-the-middle, de-synchronization, and tracking attacks. In addition to that, a formal analysis is conducted using Gong, Needham, and Yahalom logic and automated validation of internet security protocols and applications tool to verify the security of the proposed protocol. The protocol is proven to be efficient with respect to storage, computational, and communication costs. In addition to that, a further step is taken to ensure the robustness of the protocol by analyzing the probability of data collision written to the blockchain.
引用
收藏
页码:7273 / 7285
页数:13
相关论文
共 38 条
[1]  
Bell J, 2017, 2017 IEEE/ACM 12TH INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING FOR SCIENCE (SE4SCIENCE), P13, DOI [10.1109/SE4Science.2017..11, 10.1109/SE4Science.2017.11]
[2]  
Buckley D., 2018, 21 GS1
[3]  
Cai SY, 2009, LECT NOTES COMPUT SC, V5927, P150
[4]   A Feasible and Easy-to-Implement Anticollision Algorithm for the EPCglobal UHF Class-1 Generation-2 RFID Protocol [J].
Chen, Wen-Tzu .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2014, 11 (02) :485-491
[5]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[6]   Secure Message Communication Protocol Among Vehicles in Smart City [J].
Dua, Amit ;
Kumar, Neeraj ;
Das, Ashok Kumar ;
Susilo, Willy .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (05) :4359-4373
[7]   Security flaws in a recent RFID delegation protocol [J].
Erguler, Imran ;
Anarim, Emin .
PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (03) :337-349
[8]  
Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854
[9]   Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions [J].
Gope, Prosanta ;
Lee, Jemin ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) :2831-2843
[10]   Privacy-Preserving Mutual Authentication in RFID with Designated Readers [J].
Guo, Fuchun ;
Mu, Yi ;
Susilo, Willy ;
Varadharajan, Vijay .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) :4819-4845