| Literature DB >> 31683885 |
Khwaja Mansoor1, Anwar Ghani2, Shehzad Ashraf Chaudhry3, Shahaboddin Shamshirband4,5, Shahbaz Ahmed Khan Ghayyur6, Amir Mosavi7,8.
Abstract
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security.Entities:
Keywords: IoT Security; RFID security; authentication protocol; symmetric cryptography
Year: 2019 PMID: 31683885 PMCID: PMC6864817 DOI: 10.3390/s19214752
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Radio Frequency Identification (RFID) System Architecture.
RFID-tag features.
| Features | Passive Tags | Active Tags |
|---|---|---|
| Data Storage | 128 bytes | 128 bytes |
| tag Power | Energy transferred through Radio Frequency from Reader | Internal source to tag |
| tag Battery | No | Yes |
| Availability of Source Power | Only in range of Radar | Continuous |
| Signal Strength required to tag | Very High | Very Low |
| Range | Upto 3–5 M | Upto 100 M |
| Multiple tag Reading | less then thousand tags within 3 M of Reader range | More then 1000 tags recognized upto 100 mph |
Notation Guide.
| Notations | Description |
|---|---|
|
| RFID-tag |
|
| Reader Device |
|
| Database Server System |
|
| ith tag identity |
|
| One-time tag alias identity |
|
| Shadow identity |
|
| jth Reader identity |
|
| tag Random number |
|
| Reader Random number |
|
| Shared key of Server and tag |
|
| Shared emergency key of Server and tag |
|
| Server and Reader shared secret key |
|
| Track sequence number (used by both S and T) |
|
| Randomly derived from Shadow-ID and Emergency Key |
|
| Hash function |
| ⊕ | The exclusive XOR operation |
|
| concatenation |
Figure 2Gope-Hwang’s proposed registration scheme.
Figure 3Gope-Hwang’s proposed authentication scheme.
Figure 4Registration phase of the proposed protocol.
Figure 5Proposed authentication protocol.
BAN logic Notations.
| Notations | Description |
|---|---|
|
| P believes that X |
|
| P sees that X |
|
| P once said X |
|
| P have total jurisdiction on X |
|
| X is updated and fresh |
|
| X, Y is component of formula(X,Y) |
|
| X is combine with Y |
|
| Hash of message X using a key K |
|
| P and Q share key K for communication |
|
| |
|
| Message-Meaning rule |
|
| Freshness-conjuncatenation rule |
|
| Nonce-verification rule |
|
| Jurisdiction rule |
|
| P believes X |
Figure 6ProVerif Simulation.
Security requirements table.
| Requirements | Yang et al. [ | Tan et al. [ | Cai et al. [ | Cho et al. [ | Gope et al. [ | Proposed Scheme |
|---|---|---|---|---|---|---|
| SR1 | × | × | √ | √ | √ | √ |
| SR2 | × | × | × | √ | √ | √ |
| SR3 | × | × | √ | × | √ | √ |
| SR4 | × | √ | × | √ | √ | √ |
| SR5 | × | × | × | × | √ | √ |
| SR6 | × | × | × | √ | × | √ |
| SR7 | √ | × | √ | √ | × | √ |
| SR8 | √ | √ | √ | √ | √ | √ |
| SR9 | √ | √ | √ | √ | √ | √ |
| SR10 | √ | √ | √ | √ | √ | √ |
| SR11 | √ | √ | √ | √ | × | √ |
√: Yes provides, ×: Does not provide.
Comparison of computation cost and running time.
| Computation Cost | Yang et al. [ | Tan et al. [ | Cai et al. [ | Cho et al. [ | Gope and Hwang [ | Proposed Scheme |
|---|---|---|---|---|---|---|
|
| 2 | 2 | 4 | 3 | 5 | 2 |
|
| 3 | 2 | 2 | 2 | 2 | 2 |
|
| 5 | 3 | 6 | 5 | 7 | 4 |
|
| 10 | 7 | 12 | 10 | 14 | 8 |
|
| 0.023 ms | 0.0161 ms | 0.0276 ms | 0.023 ms | 0.0322 ms | 0.0276 ms |
Figure 7Running Time of Proposed Scheme.
Communication Cost of Proposed and other Protocols.
| Schemes | tag | Reader | Server | Total Bits | Messages |
|---|---|---|---|---|---|
| Yang et al. [ | 256 | 512 | 640 | 1408 | 5 |
| Tan et al. [ | 896 | 768 | 768 | 2432 | 4 |
| Cai et al. [ | 256 | 544 | 256 | 1056 | 5 |
| Cho et al. [ | 512 | 512 | 256 | 1280 | 5 |
| Gope and Hwang [ | 416 | 1180 | 288 | 1888 | 4 |
| Proposed Protocol | 416 | 736 | 416 | 1568 | 4 |
Figure 8Communication Cost.