Closed-loop and open-loop authentication protocols for blockchain-based IoT systems

被引:9
作者
Aghili, Seyed Farhad [1 ]
Mala, Hamid [2 ]
Schindelhauer, Christian [3 ]
Shojafar, Mohammad [4 ]
Tafazolli, Rahim [4 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[2] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
[3] Univ Freiburg, Dept Comp Sci, Freiburg, Germany
[4] Univ Surrey, ICS 6GIC, Guildford, Surrey, England
关键词
Internet of things (IoT); Blockchain; RFID; Chebyshev chaotic map; Mutual authentication; Reader compromised attack; LIGHTWEIGHT; SECURITY; ATTACKS;
D O I
10.1016/j.ipm.2021.102568
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designers of smart environments based on radio frequency identification devices have a challenging task to build secure mutual authentication protocols. These systems are classified into two major factions which are traditional closed-loop systems, and open-loop systems. To the best of our knowledge, all of the mutual authentication protocols previously introduced for these two categories rely on a centralized database but they fail to address decentralized mutual authentication and their related attacks. Thanks to the blockchain technology, which is a novel distributed technology, in this paper, we propose two decentralized mutual authentication protocols for IoT systems. Our first scheme is utilized for traditional closed-loop RFID systems (called CLAB), and the second one applies to open-loop RFID systems (called OLAB). Meanwhile, we examine the security of the Chebyshev chaotic map-based authentication algorithm and confirm that this algorithm is unprotected against tag and reader impersonation attacks. Likewise, we present a denial of service (DoS), tag impersonation, and reader impersonation attacks against the Chebyshev chaotic-map based protocol when employed in open-loop IoT networks. Moreover, we discover a full secret recovery attack against a recent RFID mutual authentication protocol which is based on blockchain. Finally, we use the BAN-logic method to approve the security characteristics of our CLAB and OLAB proposals.
引用
收藏
页数:16
相关论文
共 45 条
[1]   New authentication/ownership transfer protocol for RFID objects [J].
Aghili, Seyed Farhad ;
Mala, Hamid .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
[2]   DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT [J].
Aghili, Seyed Farhad ;
Ashouri-Talouki, Maede ;
Mala, Hamid .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (01) :509-525
[3]   Attacks and improvements to chaotic map-based RFID authentication protocol [J].
Akgun, Mete ;
Bayrak, Ali Osman ;
Caglayan, Mehmet Ufuk .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :4028-4040
[4]   Vulnerabilities of RFID Security Protocol Based on Chaotic Maps [J].
Akgun, Mete ;
Caglayan, M. Ufuk .
2014 IEEE 22ND INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2014, :648-653
[5]  
[Anonymous], 2015, Emergency response workers and employers
[6]  
Bagheri M, 2019, DESIGNING LIGHTWEIGH
[7]   PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling [J].
Baniata, Hamza ;
Anaqreh, Ahmad ;
Kertesz, Attila .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (01)
[8]   Security enhancement of the authenticated RFID security mechanism based on chaotic maps [J].
Benssalah, Mustapha ;
Djeddou, Mustapha ;
Drouiche, Karim .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) :2356-2372
[9]   A Survey on Blockchain for Information Systems Management and Security [J].
Berdik, David ;
Otoum, Safa ;
Schmidt, Nikolas ;
Porter, Dylan ;
Jararweh, Yaser .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (01)
[10]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393