| Literature DB >> 35023996 |
Masoumeh Safkhani1, Samad Rostampour2,3, Ygal Bendavid3, Nasour Bagheri4.
Abstract
Nowadays the sharing of trade in counterfeit and pirated goods is constantly growing and fake products are found in a large number of industries - particularly pharmaceuticals, food, and medical equipment - that can pose serious health and safety risks. With the intention of avoiding any loss of client confidence and any disclosure of sensitive information, Internet of Things (IoT) solutions are increasingly used to fulfill this need for a reliable and secure infrastructure in medical & pharmaceutical industry. When looking at the technologies used to identify products and packaging, balancing security and hardware limitations is often a difficult task and using cost-effective techniques such as bit-oriented lightweight functions is a challenge. In this study, we first assess the security level of a recently proposed protocol and prove its vulnerabilities, due to a lack of complexity in bit-oriented functions. Then, to address these exposed flaws, a lightweight improved protocol based on Authenticated Encryption (AE) cryptosystems is presented. Security analysis results demonstrate that weaknesses of previous efforts have all been adequately addressed; additionally, the improved protocol has a robust security posture in terms of confidentiality and integrity. Moreover, FPGA and ASIC simulations are carried out using five different AE schemes from CAESAR competition to develop three use-cases, in whose best scenario the proposed tag has 731 LUT and needs 3335 gates for the security module.Entities:
Keywords: Authenticated Encryption; Internet of Things; Medical IoT; RFID; SecLAP; Security; Supply chain
Year: 2020 PMID: 35023996 PMCID: PMC7497782 DOI: 10.1016/j.comnet.2020.107558
Source DB: PubMed Journal: Comput Netw ISSN: 1389-1286 Impact factor: 4.474
Fig. 1The infrastructure of an IoT-enabled traceability system.
Fig. 2Opportunities to conduct a malicious attack in the supply chain.
Notations used in this paper.
| Symbol | Description |
|---|---|
| An RFID reader | |
| The identification value of the reader | |
| A cloud server | |
| An RFID tag | |
| The identification value (ID) of the tag | |
| The current session number | |
| The new session number | |
| The pseudo random number generator | |
| The bit-oriented operation defined by Fan | |
| The rotation of sting | |
| The bit-oriented operation defined which is used in SecLAP | |
| Odd bits of string | |
| Even bits of string | |
| The bitwise XOR operation | |
| The concatenation operation | |
| Two temporary bits that are used to indicate the status of the last session | |
| The bitwise complement of the string | |
| Tag’s ID in the improved protocol | |
| Secret Tag’s ID in the improved protocol | |
| Encryption key | |
| A random number |
Fig. 3The structure of function in SecLAP, where .
Fig. 4Mutual authentication phase of SecLAP [29].
Fig. 5A toy example of calculation of .
Fig. 6General structure of an AEAD module.
CAESAR Competition final portfolio [34].
| Use-case category | CAESAR finalist candidates |
|---|---|
| Lightweight applications | ACORN |
| High-performance applications | AEGIS-128 |
| Defense in depth | COLM |
Fig. 7Authentication and key agreement phase of the improved protocol.
GNY logic notations and logic rules in this paper.
| Notations | Description |
|---|---|
| Combination of two formula | |
| Shows | |
| Means that if | |
| Means that if | |
| Means that if | |
| Means that if |
Improved protocol messages’ GNY logic expression.
| # M. | Description |
|---|---|
Improved protocol messages’ idealization (M. denotes Message).
| # M. | Description |
|---|---|
Assumptions and security goals of improved protocol (A./G. denotes Assumption/Goal).
| # A./G. | Description |
|---|---|
Security goals deduction of the improved protocol.
| DN | GMA | UR | DD | GN |
|---|---|---|---|---|
| – | ||||
| – | ||||
| – | ||||
| – | ||||
Fig. 8Security results of improved protocol through the Scyther tool.
Comparison of resistance to different attacks.
| Protocols | Liao and Hsiao | Zheng et al. | Fan et al. | SecLAP | AE-based | ||||
|---|---|---|---|---|---|---|---|---|---|
| Resistance to traceability attacks | No | No | No | No | Yes | ||||
| Resistance to desynchronization attacks | No | No | No | No | Yes | ||||
| Resistance to replay attacks | No | No | No | No | Yes | ||||
| Resistance to secret disclosure attacks | No | Yes | No | No | Yes |
FPGA and ASIC implementation results, where SM and AE-P denote Security-module and AE-protocol respectively.
| Encryption scheme | FPGA | ASIC | |||||
|---|---|---|---|---|---|---|---|
| LUT | FlipFlop | Area ( | Delay (ns) | Power (mW) | GE (SM) | GE (AE-P) | |
| ACORN | 731 | 476 | 23 321.49 | 1.42 | 1.003 | 3338 | 6743 |
| ASCON | 1540 | 980 | 41 962.73 | 0.59 | 1.167 | 12 157 | 15 565 |
| AEGIS-128 | 5582 | 1970 | 110 996.52 | 1.71 | 7.396 | 38 934 | 42 342 |
| OCB | 4124 | 1699 | 245 625.71 | 0.62 | 5.869 | 71 966 | 75 374 |
| COLM | 7535 | 2771 | 276 981.16 | 0.61 | 4.690 | 107 810 | 111 218 |
Fig. 9Schematic model of ACORN circuit.
Fig. 10Area Comparison based on FPGA and ASIC results.