Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags

被引:164
作者
Tewari, Aakanksha [1 ]
Gupta, B. B. [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Dept Comp Engn, Kurukshetra 136119, Haryana, India
关键词
Internet of Things; Authentication; Confidentiality; RFID tags; Anonymity; INTERNET; THINGS; SECURITY;
D O I
10.1007/s11227-016-1849-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is an evolving architecture which connects multiple devices to Internet for communication or receiving updates from a cloud or a server. In future, the number of these connected devices will increase immensely making them an indistinguishable part of our daily lives. Although these devices make our lives more comfortable, they also put our personal information at risk. Therefore, security of these devices is also a major concern today. In this paper, we propose an ultra-lightweight mutual authentication protocol which uses only bitwise operation and thus is very efficient in terms of storage and communication cost. In addition, the computation overhead is very low. We have also compared our proposed work with the existing ones which verifies the strength of our protocol, as obtained results are promising. A brief cryptanalysis of our protocol that ensures untraceability is also presented.
引用
收藏
页码:1085 / 1102
页数:18
相关论文
共 39 条
[11]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[12]   A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks [J].
Guo, Ping ;
Wang, Jin ;
Geng, Xue Hua ;
Kim, Chang Seob ;
Kim, Jeong-Uk .
JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06) :929-935
[13]  
Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
[14]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394
[15]  
Juels A, 2005, LECT NOTES COMPUT SC, V3621, P293
[16]   Defining strong privacy for RFID (Extended abstract) [J].
Juels, Ari ;
Weis, Stephen A. .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, :342-+
[17]  
Kelsey J, 1998, LECT NOTES COMPUT SC, V1372, P168
[18]  
Khoo B., 2011, Proceedings of the 2011 IEEE International Conference on Internet of Things and 4th IEEE International Conference on Cyber, Physical and Social Computing (iThings/CPSCom 2011), P709, DOI 10.1109/iThings/CPSCom.2011.83
[19]  
Molnar D, 2004, C COMP COMM SEC ACM, P210, DOI DOI 10.1145/1030083.1030112
[20]  
Ouafi K, 2008, LECT NOTES COMPUT SC, V5037, P479, DOI 10.1007/978-3-540-68914-0_29