Literature DB >> 31487847

A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems.

Deebak B D1, Fadi Al-Turjman2, Leonardo Mostarda3.   

Abstract

With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures, iris scanners, etc., to infer the environmental status. These devices are generally identified using radio-frequency identification (RFID) to transfer the collected data to other local or remote objects over a geographical location. To enable automatic data collection and transition, a valid RFID embedded object is highly recommended. It is used to authorize the devices at various communication phases. In smart application devices, RFID-based authentication is enabled to provide short-range operation. On the other hand, it does not require the communication device to be in line-of-sight to gain server access like bar-code systems. However, in existing authentication schemes, an adversary may capture private user data to create a forgery problem. Also, another issue is the high computation cost. Thus, several studies have addressed the usage of context-aware authentication schemes for multimedia device management systems. The security objective is to determine the user authenticity in order to withhold the eavesdropping and tracing. Lately, RFID has played a significant for the context-aware sensor management systems (CASMS) as it can reduce the complexity of the sensor systems, it can be available in access control, sensor monitoring, real time inventory and security-aware management systems. Lately, this technology has opened up its wings for CASMS, where the challenging issues are tag-anonymity, mutual authentication and untraceability. Thus, this paper proposes a secure hash-based RFID mechanism for CASMS. This proposed protocol is based on the hash operation with the synchronized secret session-key to withstand any attacks, such as desynchronization, replay and man-in-the-middle. Importantly, the security and performance analysis proves that the proposed hash-based protocol achieves better security and performance efficiencies than other related schemes. From the simulation results, it is observed that the proposed scheme is secure, robust and less expensive while achieving better communication metrics such as packet delivery ratio, end-to-end delay and throughput rate.

Entities:  

Keywords:  RFID; context aware sensor management systems; de-synchronization; multimedia device management systems; replay; traceability

Year:  2019        PMID: 31487847      PMCID: PMC6766990          DOI: 10.3390/s19183821

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

In the recent past, the development of smart computing devices in the Internet of Things (IoT) has grown exponentially [1,2]. These devices share the geo-location of physical objects with other systems. They are widely used in smart infrastructure to build the smart city features such as smart eHealthcare, finance, e-Governance, parking and transportation [3]. There are more physical objects involved in connecting IoT-based applications in smart infrastructure. This infrastructure often integrates radio frequency identification (RFID) to configure different application environments such as smart inventory, toll-booth collection, object identification, anti-counterfeit protection and the automobile industries [4]. In contrast to bar-coding systems, the physical objects equipped with an RFID tag are not required to be in line-of-sight to read the encapsulated data. As a result, a long-sighted RFID-tag position can easily extract a large amount of RFID information to replace traditional supply-chain management systems with an RFID-based authentication system. Besides, the real-time objects track and identify the RFID information wirelessly to automate communication systems. It is considered as a promising technology to monitor the smart objects. The technology known as Radio Frequency Identification (RFID) reads the physical objects and automatically recognizes the relative object details, i.e., it is basically a non-contract recognition technique [5]. This technique uses some type of artificial inference to sense the radio frequency that provides a communication between the tags attaching with the objects and the readers connecting with the backend server systems. Using this technology, several application systems such as chain management, credit-card, electronic passport verification, vehicle systems (i.e., charging and keyless entry), etc. have been designed and developed. Specifically, the countries like Japan, USA and other developing countries are nowadays becoming equipped with advanced RFID systems [6]. Lately, it has undergone further advancement in the form of electric induction [7] that recognizes the tag attachment object to read the object information. RFID tags do not need any light source to sense the data through external materials, which makes them durable, low-cost, reliable and secure in comparison with bar-code systems [8]. Most retailers have employed this technology for integration of tag attachments that allow an authorized dealership to deliver the goods. For instance, Wal-Mart imbeds RFID tags in products which reduces the manpower and the materials resource needed by producers [9]. Moreover, this technology is now considered to be an integral part of people’s daily activities such as the use of cellphones, automobiles, household objects, etc. It does not need any physical contact to sense or scan different types of objects. Importantly, it uses one signal to scan the various types of barcodes and in addition it has an ability to read and write tags multiple times [10]. This technology can even be used in different climate conditions like snow, fog and in packaging [11]. It is perceived to be a significant advancement for the development of future markets. Most of the enterprises and manufacturing industries including governments, banking, transportation, agriculture, food safety, healthcare, etc. are attaching these tags to automate the product delivery process faster in order to improve customer service and business automation efficiency. In the past, the usage of RFID, specifically in the range of high-frequency (HF-13.56 MHz) has gained much attention. Particularly, the Near Field Communication (NFC) standard has been designed and improved for the five types of NFC’s i.e., in correspondence with different types of ISO/IEC and JIS standards. In general, the type 1, 2 and 4 are overlaid for ISO/IEC 14443-A, whereas the type 3 and 5 are dealt with in JIS X6319 and ISO/IEC 15693 (18000-3), respectively [12]. New manufacturers like NXP Semiconductor (Newburyport, MA, USA) have advanced the use of NFC technology, i.e., ntag-213/215/216. NFC cards are used in access control to improve the enterprise security. Smartphone usage has developed exponentially in the past few years. As referred in [13], the number of smartphones used worldwide is predicted to be 4.49 billion (i.e., 59.9% of the global population). This generalization demands high user-level confidentiality to ensure security and privacy. In the USA [14] and EU [15], national program and strategies have intensified researchers’ attention in support of privacy. Recently, the computation power of programmable smartcards has increased tremendously for the massive development of smart electronic devices such as public transportation, e-passports, e-ticketing and e-identification. These RFID-based communication devices are expected to provide tag anonymity in order to ensure privacy enhancement. Due to security and privacy issues, RFID-based authentication schemes are gradually becoming assimilated in several real-time applications. Generally speaking, RFID manages to track the unauthorized client access to ensure the privacy of RFID tags to resist potential vulnerabilities. Due to their limited computation resources, power and storage capabilities, it is more complicated to apply the expensive cryptographic operations in low-power RFID systems. Moreover, the expensive computations have slowed the development of RFID technologies [16,17,18]. Most significantly, adoptive RFID technologies cannot properly exploit the authentication process to enhance their security-level. In order to restrict malicious activities, the source messages should be prevented from fake broadcasting. It is noted that the physical security of RFID tags should be proactively secured to prevent unauthorized access. Moreover, the attackers then would not be able to track the previous user tag information to impersonate a legitimate user. Thus, this paper introduces a novel hash-based RFID mechanism using synchronized secret session key value and its objective is to: (1) Provide user privacy; (2) Reduce the power consumption; (3) Reduces cost of the tag; and (4) Offer mutual authentication, tag-anonymity and traceability. The remaining sections of this paper are organized as follows: Section 2 discusses the research background, including communication models, motivation and enabling technologies and its key objectives; Section 3 presents context-aware sensor management systems; Section 4 proposes a novel hash-based RFID mutual authentication protocol; Section 5 presents an informal security and performance analysis; Section 6 demonstrates the experimental analysis using NS-3; and finally Section 7 concludes the research work.

2. System Models

This section discusses the system communication models and research motivation to explain the key factors of hash-based RFID authentication.

2.1. System Communication Model

A basic RFID system consists of three communication entities, namely the receiver (reader), transponder (tag) and a backend database such as a server to store and analyze the data. In general, the RFID tags are attached on physical objects that locate and identify physical things among thousands of objects. Each RFID has a small built-in antenna that attaches a microchip with limited memory space to store the identities of data objects [19]. The RFID reader is basically used as a scanner that interrogates the tag information existing in scanning system environment. A server such as a backend database strategically handles the massive amount of generated data for data processing and storage, offering an influential and necessary processing capability and storage space. Furthermore, it operates the system processor to read, manage, control and store the tag data from the attached tags in the RFID reader as illustrated in Figure 1.
Figure 1

A basic system model of radio frequency identification (RFID).

2.2. Research Motivation

RFID is used to collect the static informational data; however tags cannot extract dynamic informational data, like humidity, acceleration and temperature. On the other hand, sensor systems nowadays are capable to collect all kind of dynamic information data to fill communication gaps using RFID systems. Therefore, the RFID system is integrated with the sensors to collect and monitor the environmental status related to the informational data items. This research refers to a device that integrates a RFID tag and a sensor called Sensing RFID (SRFID). The system device tries to integrate the sensor into an RFID tag to deal with the several challenging issues in large-scale or open-loop systems. The first challenge of the system is the use of non-smart sensors that have specific application requirements for different types of sensors. Moreover, the system models and its related sensor parameters of devices produced by different manufacturers have different types of functionality, even if the sensors are of the same nature. The following issues are identified, as and when the sensors of the SRFID are configured in a standard way for off-the-shelf readers: (1) SRFID has unique differentiation by the readers; (2) The sensor parameters have automatic sensor recognition features; and (3) The parameters related to the sensor have effective configurations. When the sensor collects the sampling datasets to transfer them to the reader, the datasets, such as parsing and identification, represent additional problems. The identification problems are related to the description of the sensors. The objective of the sensors is to provide interoperability between SRFID tags and readers/host applications, though general purpose sensors, such as analog and digital devices do not have such self-descriptive functions and capability to define the sensors. The second challenge of the system is the data storage related to the SRFID tag. The sensors are diverse in nature, and thus may vary for every SRFID tag. Therefore, the data storage method needs features such as simplicity, flexibility and efficiency. The reader interfaces the various sensors with the application programming interface (API) to access and control all related data of the SRFID tag. Besides, this data storage method allows convenient access to append/remove the sensor from the tag. The third challenge of the system is the sensor sampling mechanism and it is used to set up an operational mechanism to possess the needed functions to configure, collect and parse the sampling data. To overcome the above challenging problems, this paper focuses on the integral components of an active SRFID tag, namely a self-descriptive sensor, a data storage sensor and an operational sampling sensor. In addition, this paper is restricted to the self-descriptive sensor in consideration of the Plug and Play (PnP) feature [20,21]. In RFID, the issues such as security and privacy are primarily focused on physical [22] as well as security authentication mechanisms [23,24,25]. As the physical mechanism incurs more additional cost, security authentication schemes are very attractive in practical use. Chien et al. [23], Kim et al. [24,25] and Hajny et al. [12] have studied cross-examination. Since the authentication schemes [12,23,24,25] do not validate the secret session key of the tag and reader, they are susceptible to various kinds of malicious attacks, such as eavesdropping and tracing, replay, man-in-the-middle and desynchronization. Besides, they do not comply with the security properties of tag anonymity and untraceability.

2.3. Enabling Technologies and Its Key Objectives

The Internet has become more prevalent for social-media networks and various emerging technologies such as wireless sensor networks (WSN), Internet of Things (IoT), cloud computing (CC) and big-data management. These technologies enable people to communicate and share their interests in several ways. As a result, technological advances create new application models and business opportunities to offer comfort, safety, and more computational efficiency. Of late, CC and IoT have been more relevant for industry and academic collaboration. Ashton presented the IoT concept [26] that defines the purpose of physical objects and wireless channels [27]. McCarthy [28] introduced the cloud computing concept that derives a large-scale distributed system to drive several economic benefits such as virtualization, data storage, and computation power. IoT and CC are service computing platforms that allow object interconnection, including personal and sensitive data, over wireless channels [29,30,31]. The collective data of physical objects or sensors is generally stored on a cloud-server [32,33,34,35]. However, features such as security and privacy are highly demanded to prevent malicious activities [36]. Ferrag et al. [37] and El-Hajj et al. [38] discussed the IoT requirements, including authentication, authorization, confidentiality, privacy and message integrity to signify the importance of node protection. Therefore, to fulfill the standard requirements of an authentication protocol, a suitable mechanism is highly recommended. It can verify the user identities to determine whether he/she is vulnerable or not on open networks [37,38]. Due to network vulnerabilities and Internet security, user authentication plays a crucial role [39]. From the above discussion, the important aspects of RFID authentication protocols have been studied for different IoT environments including industrial management, payment schedules, and several emergency systems. These environments use RFID-tags to achieve more computation power, speed, and physical object robustness than traditional barcode systems. Moreover, technological advancements have addressed several security issues for RFID-based security systems. Concerning the property of untraceability, several RFID-based authentication protocols have simply traded the privacy for the purpose of better system performance. Most of the authentication protocols merely encrypt the tag identity of RFID using cryptographic functions. In case of verification, the reader or back-end server is expected to perform an extensive operation to authorize the RFID-tag, resulting in poor system performance. Of late, several authentication protocols have been proposed for low-cost RFID systems [40,41,42,43,44,45,46,47]. However, they are reported to have high execution cost, security weaknesses, and vulnerabilities. Chien et al. [40] presented a strong authentication and strong integrity (SASI) protocol that is based on ultra-lightweight authentication. However, their protocol is highly prone to tag tracing and desynchronization attacks [41,42,43]. To address the critical issues of SASI, Peris-Lopez et al. [44] introduced the Gossamer protocol. Unfortunately, it could not resist desynchronization attacks [45]. Of late, Fan et al. [46] presented an ultra-lightweight authentication for mobile commerce applications including cryptographic operations such as XOR, shift and addition modulo operations, but Aghili and Mala [47] have proven that the Fan et al. scheme cannot resist physical and reader impersonation attacks. Table 1 summarizes the challenging issues of existing RFID-based authentication protocols.
Table 1

Challenging issues of existing RFID-based authentication protocols.

Authentication ProtocolTechnique UsedIssue Addressed
Xu et al. [48]Lightweight Authentication Using Physical Unclonable FunctionSusceptible to secret disclosure and desynchronization attack
Bendavid et al. [49]Lightweight Authentication Using Physical Unclonable FunctionPerform frequent execution of setup phase to acquire a new set of pseudo-identity; whereby the back-end server experiences performance deprivation
Gope et al. [50]Lightweight Anonymous Based Authentication Using Physical Unclonable Function
Wang et al. [51]Stability Guaranteed Physical Unclonable Function
Benssalah et al. [52]Authentication Using Elliptic Curve Signature with Message RecoveryIncur more communication cost and susceptible to untraceability
To address the above issues, this paper presents a novel hash-based RFID mechanism using synchronized secret session key values. This mechanism tactfully meets the crucial security requirements of IoT-based multimedia systems, namely mutual authentication, untraceability, and resilience to desynchronization attacks. Moreover, it has a built-in context aware management system to handle the storage parameters and thus it can reduce the additional communication cost to improve the overall system performance. Importantly, it does not perform any exhaustive search to affect the execution of back-end servers.

3. Context-Aware Sensor Management Systems

Figure 2 shows the block diagram of the integration of a virtual TEDS system in IEEE 1451 [53]. The purpose of IEEE 1451 is to identify the parameters of non-smart sensors to access the memory where the datasets related to the TEDS are stored. The IEEE standards, namely IEEE 1451.7 [54], ISO/IEC 24753 [55] and ISO/IEC/IEEE 21451-7 [55] integrate RFID tags and sensors to specify and interface the sensor security and data structure. The standard of ISO/IEC/IEEE 24753.7 is identical to the IEEE standard of 1451.7 which specifies the model related to the application interface to integrate the RFID tag and sensor. This integration is done to execute the functional commands of the sensor application system. These standards integrate the RFID tag and sensor to develop a smart sensor system with RFID tags. However, they do not work with the integral components of existing sensors, such as analog and digital ones to act as a smart sensor system with RFID tags.
Figure 2

Integration of virtual TEDS systems in IEEE 1451.

The sensor management system has a self-descriptive model like Sensor Web Enablement (SWE) [56,57,58,59] initiated by the Open Geospatial Consortium (OGC) to standardize the data encoding and web service interface. In addition, the OGC has built a web-based sensor model for the Sensor Modeling language (SensorML) [21]. The W3C Semantic Sensor Network (SSN) group has proposed an ontology description of SSN [22]. However, these data descriptive sensors are generally employed at the host computer/network level but not the sensor-node level. Moreover, these data descriptive methods use Extensible Markup Language (XML) that has an enormous functional format and thus this language requires an XML-Parser to consume less memory storage. Therefore, XML files are difficult to deploy in self-descriptive/context-ware sensors to retrieve, remove and modify the sensing data. The self-descriptive/context-aware method is usually not suitable for sensor application systems, and so this paper proposes a novel strategy to back up the sensing data in the SRFID tags to protect the exchanged information.

4. Novel Hash-Based RFID Mutual Authentication Protocol

A novel hash-based RFID mutual authentication protocol using a secret-session key is proposed. A novel session-key sharing strategy is used to secure the communication between the reader/user and the back-end database server. Figure 3 illustrates the novel hash-based RFID mechanism. The phases of the mechanism, namely Pre-phase registration, Readers Pro-Tag request and Response, Tag Mutual Session-key Authentication, Back-end Server Key Authentication and Session-key Updating are executed to solve the challenging issues of the existing protocols, such as security, privacy and forgery. To address the issue of security, this paper uses a secret-session key as a significant feature. In addition, the session keys are subsequently generated at the back-end database server to update the output values of the session keys of the tag. Table 2 shows the important notations used in this paper.
Figure 3

Proposed workflow of the novel hash-based RFID mechanism.

Table 2

Important notations used.

NotationDescription
IDK Identity of the k-th Key
ID Tag identity
Ri Random integer generated by reader
Rj Random integer generated by tag
SSk Secret session-key mutually shared between back-end server and tag
SSk1 Secret session-key in the k-th session
H(.) One-way hash operational function
Bitwise XOR operator
ΔTs Expected transmission delay
Ts1, Ts2, Ts3Current timestamps
Concatenation operator
Newmsg Message format

4.1. Phase I: Pre-Phase Registration

The execution flow of the pre-phase registration are as follows: The back-end database server and the tag mutually share their credentials, such as Tag- in the pre-phase registration of the proposed mechanism. The reader and tag have a unique random number generator to authenticate the services like role assignment. For each tag, the back-end database server collects the parameters, namely and assign the values. is the secret-session key of the current session tag . is the secret-session key of the previous session tag , since its initial value is set to null. Information of the object/role that is tagged to the back-end database server to assign the access privileges.

4.2. Phase II: Readers Pro-Tag Request and Response

The reader randomly selects an integer to send a request to the tag. Then, the tag generates a random integer to compute: ; ; and , where is the current timestamp of the tag. After the computation of , the tag sends its response message as to the reader. After receiving the response message from the reader, the reader sends the message of response to the back-end server, after being added to the computational integer of .

4.3. Phase III: Tag Mutual Session-Key Authentication

Upon receiving/extracting the tag informational data from the database, the back-end server executes the computational following steps: If , then the back-end server terminates the login request of the user, where is the current timestamp in the remote-server and is the expected transmission delay. Compute: Validate: Repeat the execution steps (1) and (5) till the value of is equal to from the response message of reader. If the values are equaled, then the right tag will be found. Compute: Upon receiving the appropriate-tag, the back-end server communicates the tag information to the readers to update the value of secret session-key. In addition to the computation and validation, this phase also executes the following steps to update the readers’ session-key: The back-end server forms a new message format as , where is the information of the tag to be communicated to the reader to ensure the property of mutual authenticity. If the back-end server fails to deduce a valid right tag, then the server deduces that there is an invalid message authentication to terminate the user session. After the execution of new message , the reader executes the following steps to maintain the communication: The back-end server sends the new message of to the reader. Upon receiving the new message of from the back-end server, the reader excludes the parameter of and sends the parameter of to the tag to maintain the communication.

4.4. Phase IV: Back-End Server Key Authentication and Session-Key Updation

Based on the message at , the tag executes the following steps to authenticate the back-end server: If , then the tag terminates the login request of the user, where is the current timestamp in the tag and is the expected transmission delay. Compute: , if the condition is valid, then the tag authenticates the back-end server to confirm that the computed hash value is identical to incur the value of from the reader. After the authentication of back-end server, the secret session-key is updated into to server the communication between server and tag.

5. Security and Efficiency Analysis

This section focuses its discussion on the security and performance analysis by comparing the security properties and computation cost with other related protocols [12,24,25].

5.1. BAN Logic Analysis

BAN logic [60] analysis is highly preferred to signify the design process that ensures the security structure of authentication protocol when it starts to build [61]. Moreover, it is a standard way to satisfy the security features of any application system [62,63]. In general, the formal analysis model is comprised of four methods: logical procedure, common analysis, model detection and proof of theorem. This paper chooses BAN logic to verify a belief of agreements as a logical structure [64] in order to analyze the security features of proposed hash-based protocol. The proof of verification is classified into four descriptive parts that are as follows: A) Protocol Explanation In this part, the information processes and its related transmission parameters are briefly introduced to entail the structure of the systems where represents the RFID tag, represents the reader and represents the back-end server: , where , where B) Initial Assumption In this part, the important assumptions of proposed hash-based protocol are listed that are defined as follows: , , , C) Providing Security Features In this part, three security features are provided to validate user entities and data synchronization. The detailed user entities are as follows: , , D) Proof of Security Process The process of security proof explains the representation of , where is the premise, is the conclusion and is a symbol of meta-linguistic. From the BAN logic, the seeing rule and the protocol explanation is applied to obtain: From the BAN logic, the freshness rule and the protocol explanation are combined to attain: In case of i.e., from protocol explanation, it can be obtained as: Similarly, it can be expressed as: As a result, the first proven goal is achieved from the given Equations and . From the BAN logic, the seeing rule, the and the initial assumptions can be obtained as: From the initial assumption , it can be obtained as: Similarly, it can be expressed as: As a result, the second proven goal is realized from the given Equations and . According to the rule of message-meaning and the initial assumption, it can be expressed as: Therefore, it can be represented as: Similarly, it can be expressed as: As a result, the third proven goal is realized from the given Equations and . From the above Equations to , the security features , and have claimed to be successfully verified. This ensures that the proposed hash-based protocol achieves the property of mutual authentication between the tag, the reader and the back-end server. Moreover, it ensures the security of data synchronization for the proposed hash-based protocol.

5.2. Informal Analysis

The proposed novel hash-based RFID mutual authentication protocol claims that it can provide a high-secure authentication against the most of the potential attacks, namely replay, eavesdropping and man-in-the-middle; since the proposed mechanism is based on the hashing operation and secret session-key synchronization: Mutual Authentication: The proposed novel hash-based RFID mechanism offers bilateral authentication between the communication parties. The back-end server authenticates the tag by the computation of on the server-side which will be validated with the received response-message sent by the reader. Correspondingly, the back-end server validates its authentication by the computation of on the tag-side which will be identical with the received message sent by the reader. Resilient to Eavesdropping and Tracing: The proposed novel hash-based RFID mechanism is resilient to eavesdropping and tracing. As the proposed mechanism uses the random integers and user anonymity, the threat of tracing can be prevented, so none of the messages transport the tag information twice owing to the challenge—response mechanism used by the independent session variables . The proposed mechanism has limited hash and X-OR operations with random integers and synchronized-secret operation, therefore any threat of eavesdropping can be avoided by concealing the tag information. Hence, the proposed mechanism can successfully pass a one-way authentication step to prevent the threats, such as eavesdropping and tracing. Resilient to Replay Attacks: The proposed novel hash-based RFID mechanism can be resilient to replay attacks. As the proposed mechanism often uses the random integers , the authentication request is verified using to validate whether the current timestamp is fresh or not. After the successful validation, the confidential information will be updated within the valid time-frame. Hence, the attackers can’t deduce the information shared between the reader and the tag. Resilient to Man-in-the-Middle Attacks: As the proposed novel hash-based RFID mechanism uses the hashing and X-OR operations for each message transmission, the parameters can’t be tampered with to deduce the confidential information of the tag. Hence, the proposed mechanism can be resilient to man-in-the-middle attacks. Untraceability and Tag-Anonymity: To hide the tag information, each transaction message and update process consists of some internal parameters and also uses the random integers . The server can deduce the identification of the tag after the successful computation of these parameters sent by the tag. Hence, the proposed mechanism stops an attacker from tracing the information of the tag as well as the secret session key of the communication system. Resilient to Desynchronization Attacks: For the successful launch of desynchronization, an attacker must be able to deduce the secret session key using the related parameters and . In the proposed novel hash-based RFID mechanism, an attacker can’t infer the updated value of as it is associated with the validation of . Hence, the proposed mechanism can be resilient to de-synchronization attack. Table 3 compares the security properties of various hash-based RFID protocols in which the proposed hash-based protocol is proven to be well-secured in comparison with the other hash-based RFID protocols [12,24,25]. Besides, the proposed hash-based protocol meets all the security level of context-aware sensor management systems.
Table 3

Security properties of various hash-based RFID protocols.

Security PropertiesKim et al., 2012 [24]Kim et al., 2013 [25]Hajny et al. [12]Proposed Hash-Based Protocol
Mutual AuthenticationNot SupportPartial SupportNot SupportFully Support
Resilient to Eavesdropping AttackNoNoNoYes
Resilient to Tracing AttackNoNoNoYes
Resilient to Replay AttackNoNoNoYes
Resilient to Man-in-the-Middle AttackNoNoNoYes
Resilient to De-Synchronization AttackNoNoNoYes
Untraceability and Tag-AnonymityNot ProvidedNot ProvidedNot ProvidedProvided

5.3. Performance Analysis

In this subsection, the proposed hash-based RFID authentication protocol has been cross-verified with other existing authentication protocols [12,24,25]. To find the computation cost of the authentication protocols, a microcontroller family known as MSP430 simulates the SHA-256 with a frequency of [59]. For SHA-256, this simulator executes the hash function with . From Table 4, it is observed that the proposed hash-based protocol requires to complete seven hashing functions. However, Kim et al.’s [24,25] method needs and and that of Hajny et al. [12] requires to complete the execution. Eventually, the proposed hash-based protocol consumes less computation cost in comparison with other existing schemes [12,24,25].
Table 4

Comparison cost of computation efficiency.

Authentication ProtocolRFID-TagReaderServerExecution Time (ms)Communication Session
Forward ChannelBackward Channel
Kim et al. 2012 [24]2 Thash1 Thash4 Thash0.4543
Kim et al. 2013 [25]2 Thash3 Thash4 Thash0.6143
Hajny et al. [12]2 Thash2 Thash4 Thash0.5774
Proposed Hash-Based Protocol3 Thash1 Thash3 Thash0.4433
Note that Gope et al.’s method [65] requires a computation time of to execute functions, which is much more expensive than the proposed hash-based protocol. In view of communication phase interaction, i.e., forward and backward channels, the proposed hash-based protocol finishes the authentication mechanism with less interaction in comparison with other existing protocols [12,24,25]. From Table 4, it is observed that the proposed hash-based protocol invokes three interactive flows between the tags, the reader and the back-end server, whereas Kim et al. [24,25] and Hajny et al. [12] process four and seven flows, respectively. Moreover, the results prove that the proposed hash-based protocol has less communication cost as compared to other existing protocols [12,24,25], improving the system efficiency. As a result, it is claimed that it can be preferably deployed in IoT-based multimedia systems.

6. Experimental Study

A powerful network simulator known as NS-3 [66] is chosen to simulate the discrete events that construct a modern network environment to investigate the communication metrics such as packet delivery ratio, end-to-end delay and throughput rate. Moreover, this tool uses both IP and non-IP to simulate the network models such as LTE-A, LTE, WiMAX etc. Importantly, it is contained in several library tools to support the required simulation functions [67]. It uses Python and C++ to build or construct the program structure. Table 5 summarizes the important parameters of the NS3 simulator.
Table 5

Important parameters in NS3 Simulator.

System ParameterValues
Operating SystemUbuntu 16.04 LTS
Simulation Time1800 s
Area of RFID devices 1500×1000 m2
Availability of Readers5 Nos.
Availability of Tags160 Nos.
Transmission Range of a Reader200 m
Transmission Range of a Tag20 m
Communication EnvironmentIEEE 802.11
Speed of Communication device 1 m/s
Ubuntu 16.04 LTS is preferred to construct the simulation program that is executed for . The RFID devices are located in rectangular fashion, which equips 20 tags in a row. To realize the communication structure, the simulation has added eight consecutive rows i.e., 160 tags, where the communication distance is set to be and the distance between the device and the gateway is assumed to be Moreover, the simulation has five readers, which can randomly mobilize with a constant speed equal to . The transmission range of a reader and a tag is set to be and , respectively [68]. The network environment known as IEEE 802.11 is adopted to test the above scenario. The payload is set to be that randomly sends and receives the information for every . This scenario is tactfully constructed to examine the communication metrics namely packet delivery ratio, end-to-end delay and throughput rate, respectively.

6.1. Packet Delivery (PR) Ratio

By definition, packet delivery ratio is the ratio between the number of packets sent and the number of packets received successfully by the RFID reader. Most importantly, it is crucial to examine the performance of communication networks. From Figure 4, it is observed that the packet delivery ratio declines when the number of devices starts to increase. Even if the number of tags reaches 100, the proposed hash-based protocol records less transmission delay between the holding reader and the communication tags in comparison with other existing schemes [12,24,25]. In addition, the result reveals the drawbacks of congestion in low-power wireless environments, where the energy is highly needed to send the data packets. Significantly, it is recorded that the energy spent is dramatically increased when there is more distance between the devices. As a result, a significant value is recommended to calculate a threshold limit, whereby the server can abort a long-distance communication to achieve better performance and device lifetime.
Figure 4

Packet delivery ratio vs. number of sensor nodes.

6.2. End-To-End (E2E) Delay

End-to-end (E2E) delay calculates the average time taken to send and receive the packet between the readers and the tags. It can be defined as the transmission delay, where is the number of message transmissions, are the timestamp set for the successful packet sent and received i.e., i-th packet transmission: From Figure 5, it is noted that there is a substantial delay when the number of devices starts to increase. Due to repetitive process, more devices are trying to transmit the data packets whereby the high network congestion and distance connectivity is recorded. However, the proposed hash-based scheme has less transmission delay i.e., in comparison with other authentication schemes [12,24,25].
Figure 5

End-to-end delay vs. number of sensor nodes.

6.3. Throughput Rate (TR)

Throughput rate defines the successful transmissions between the server and the reader in . It can be generally calculated using the following equation, where is the complete execution time, quantity of packet received at the given i-th interval and is the length of transmission i-th interval packet: From Figure 6, it is found that the proposed hash-based scheme shows better packet deliverability than other authentication schemes [12,24,25]. It is also evident that the throughput rate naturally declines when the packet deliver ratio is low.
Figure 6

Throughput rate vs. number of sensor nodes.

7. Conclusions

In the past, computing devices have evolved for smart networking that manage sensitive data securely to improve the functioning of the IoT and communication systems. As the device interacts with its own community or infrastructure to collect environmental data over open networks, a secure authentication protocol is highly needed to prevent the unauthorized access. Therefore, a hash-based RFID authentication has been presented as a novel approach for controlling the physical access to devices. It can be useful for the various context-ware sensor management systems. While fixing the device identification and verification, the proposed hash-based RFID mechanism validates the identifier privately using a synchronized secret session key value to strengthen the privacy-enhancement of CASMS. The proposed mechanism uses hashing operations and secret session-key synchronization between the backend server and tag to meet all the security levels of CASMS, namely mutual authentication, untraceability and tag-anonymity. Moreover, the proposed mechanism is resilient to attacks, such as desynchronization, replay and man-in-the-middle. From our informal security and performance analysis, the proposed hash-based protocol achieves better efficiencies than other RFID authentication protocols. Also, the simulation using NS3 shows that the proposed protocol achieves better communication metrics such as packet delivery ratio, end-to-end delay and throughput rate in comparison with other existing schemes [12,24,25]. In the future, an optimized user verification algorithm will be proposed to reduce the operational execution time of the authentication protocol.
  7 in total

1.  Two RFID-based solutions to enhance inpatient medication safety.

Authors:  Hung-Yu Chien; Chia-Chuan Yang; Tzong-Chen Wu; Chin-Feng Lee
Journal:  J Med Syst       Date:  2009-09-25       Impact factor: 4.460

2.  A programmable plug & play sensor interface for WSN applications.

Authors:  Sergio D Vera; Alberto Bayo; Nicolás Medrano; Belén Calvo; Santiago Celma
Journal:  Sensors (Basel)       Date:  2011-09-21       Impact factor: 3.576

Review 3.  New generation Sensor Web Enablement.

Authors:  Arne Bröring; Johannes Echterhoff; Simon Jirka; Ingo Simonis; Thomas Everding; Christoph Stasch; Steve Liang; Rob Lemmens
Journal:  Sensors (Basel)       Date:  2011-03-01       Impact factor: 3.576

4.  A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

Authors:  He Xu; Jie Ding; Peng Li; Feng Zhu; Ruchuan Wang
Journal:  Sensors (Basel)       Date:  2018-03-02       Impact factor: 3.576

5.  IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function".

Authors:  Ygal Bendavid; Nasour Bagheri; Masoumeh Safkhani; Samad Rostampour
Journal:  Sensors (Basel)       Date:  2018-12-15       Impact factor: 3.576

6.  A Survey of Internet of Things (IoT) Authentication Schemes.

Authors:  Mohammed El-Hajj; Ahmad Fadlallah; Maroun Chamoun; Ahmed Serhrouchni
Journal:  Sensors (Basel)       Date:  2019-03-06       Impact factor: 3.576

7.  Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments.

Authors:  Lorenzo Fernández Maimó; Alberto Huertas Celdrán; Ángel L Perales Gómez; Félix J García Clemente; James Weimer; Insup Lee
Journal:  Sensors (Basel)       Date:  2019-03-05       Impact factor: 3.576

  7 in total
  1 in total

1.  Internet of Multimedia Things (IoMT): Opportunities, Challenges and Solutions.

Authors:  Yousaf Bin Zikria; Muhammad Khalil Afzal; Sung Won Kim
Journal:  Sensors (Basel)       Date:  2020-04-20       Impact factor: 3.576

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.