| Literature DB >> 35590800 |
Vikas Kumar1, Rahul Kumar1, Akber Ali Khan2, Vinod Kumar3, Yu-Chi Chen4,5, Chin-Chieh Chang6.
Abstract
The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have a significant impact on our daily lives. While the growing number of linked IoT devices makes our daily lives easier, it also puts our personal data at risk. In IoT applications, Radio Frequency Identification (RFID) helps in the automatic identification of linked devices, and the dataflow of the system forms a symmetry in communication between the tags and the readers. However, the security and privacy of RFID-tag-connected devices are the key concerns. The communication link is thought to be wireless or insecure, making the RFID system open to several known threats. In order to address these security issues, we propose a robust authentication framework for IoT-based RFID infrastructure. We use formal security analysis in the random oracle model, as well as information analysis to support the claim of secure communication. Regarding the desirable performance characteristics, we describe and analyze the proposed framework's performance and compare it to similar systems. According to our findings, the proposed framework satisfies all security requirements while also improving the communication.Entities:
Keywords: IoT; RFID; authentication; random oracle model; security
Year: 2022 PMID: 35590800 PMCID: PMC9099869 DOI: 10.3390/s22093110
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
IoT-based RFID tag features’ comparison.
| Features | Active Tags | Passive Tags |
|---|---|---|
| Data Storage | 128 bytes | 128 bytes |
| Tag Battery | Yes | No |
| Range | Up to 100 M | Up to 3–5 M |
| Multiple Tag Reading | More then 1000 tags recognized up to 100 mph | Less than a thousand tags within 3 M of the reader’s range |
| Signal Strength Required to Tag | Very low | Very high |
| Tag Power | Internal source to tag | Energy transferred through radio frequency from the reader |
| Availability of Source Power | Continuous | Only in range of radar |
Merits and demerits of the existing authentication protocols in RFID environments.
| Protocols | Approach Used | Published Year | Merits | Demerits |
|---|---|---|---|---|
| Tan et al. [ | Hash function | 2008 | Provides backward and forward secrecy | Susceptible to replay attack, insider attack, |
| and de-synchronization | DoS attack, and tag anonymity problem | |||
| Cai et al. [ | Hash function | 2009 | Provides a mutual authentication and | Vulnerable to impersonation attack, |
| anonymity and secure against stolen verifier attack | insider attack, and DoS attack | |||
| Cho et al. [ | Hash function | 2015 | Provides a mutual authentication and tag untraceability | Prone to insider attack, man-in-the-middle attack |
| and secure against stolen verifier attacks | and impersonation attack | |||
| Gope and Hwang [ | Hash function | 2015 | Prevents replay attacks, de-synchronization, | Vulnerable to collision attacks, |
| and man-in-the-middle attack | DoS attacks, and impersonation attack | |||
| Liu et al. [ | Hash function | 2018 | Provides mutual authentication, | Susceptible to stolen verifier attacks, |
| tag untraceability, and tag anonymity | collision attacks, and DoS attacks | |||
| Mansoor et al. [ | Hash function | 2019 | Attains mutual authentication, scalability, | Vulnerable to impersonation attack, man-in- |
| and data confidentiality | the-middle attack, collision attack, and replay attack |
Notations.
| Symbol | Description |
|---|---|
|
| |
|
| |
| ⊕ | Bitwise XoR operation |
|
| Cryptographic one-way hash function |
|
| Secret key of |
|
| Database server |
|
| Maximum time delay in communication |
| ‖ | Concatenation operation |
|
| Session key agreement between entities |
|
| Whether |
|
| Adversary |
| ≈ | Approximate value |
|
| The identity of the |
|
| |
|
|
Figure 1Architecture of the RAFI.
Registration phase of RFID tag.
| Tag | Database Server |
|---|---|
| Inputs | |
| Sends | |
| Generates sequence number | |
| Computes | |
| Where | |
| Computes | |
| Stores | |
| Sends | |
| upon receiving | ⇐ |
| Stores |
Login and authentication phase of RFID.
| RFID Tag | RFID Reader | Database Server |
|---|---|---|
| Generates random value | ||
| Computes | ||
| Computes | ||
| Computes | ||
| Sends | ||
| Verifies | ||
| Sends | ||
| Verifies | ||
| Computes | ||
| Verifies | ||
| Computes | ||
| Generates random value | ||
| Computes | ||
|
| ||
| Computes | ||
| Computes | ||
| Computes | ||
| Encrypts | ||
| Sends | ||
| ← | ||
| Verifies | ||
| Sends | ||
| ← | ||
| Verifies | ||
| Computes | ||
| Decrypts | ||
| Computes | ||
| Verifies | ||
| Computes |
Challenge: handshake authentication for the RAFI.
| RFID Tag | RFID Reader | Database Server |
|---|---|---|
| Challenge | ||
| Challenge | ||
| Response | ||
| ← | ||
| Success then | ||
| Response | ||
| ← | ||
| Success |
Simulation of oracles.
| Simulation Queries |
|---|
| Hash queries |
| Computes |
| Computes |
| Computes |
| Then, it answers with |
| For the |
| Verifies |
| Then, it answers with |
| For |
| Computes |
| Verifies |
| Computes |
| Generates random value |
| Computes |
| Computes |
| Computes |
| Encrypts |
| Then, it answers with |
| For the |
| Verifies |
| Then, it answer with |
| For |
| Verifies |
| Computes |
| Decrypts |
| Computes |
| Verifies |
| Computes |
| For an Execute |
| Massage |
| For a |
| For a |
| For a |
| If |
| If |
Comparison security and functionality features.
| Security Features | [ | [ | [ | [ | [ | [ | Proposed |
|---|---|---|---|---|---|---|---|
|
| × | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
| × | × | ✓ | ✓ | ✓ | × | ✓ |
|
| × | ✓ | × | ✓ | ✓ | × | ✓ |
|
| ✓ | × | ✓ | ✓ | × | × | ✓ |
|
| × | × | × | ✓ | × | ✓ | ✓ |
|
| × | × | ✓ | × | × | × | ✓ |
|
| × | × | ✓ | × | × | × | ✓ |
|
| × | × | × | ✓ | ✓ | × | ✓ |
|
| ✓ | ✓ | ✓ | × | × | ✓ | ✓ |
|
| ✓ | × | ✓ | ✓ | ✓ | ✓ | ✓ |
|
| × | × | × | ✓ | ✓ | × | ✓ |
|
| ✓ | × | × | × | ✓ | × | ✓ |
|
| × | ✓ | ✓ | ✓ | ✓ | × | ✓ |
|
| × | × | × | ✓ | × | ✓ | ✓ |
|
| × | × | × | ✓ | ✓ | × | ✓ |
Note ⇒ ×: not secure against the attack; ✓: secure against the attack; “RAFI1: mutual authentication; RAFI2: tag untraceability; RAFI3: tag anonymity; RAFI4: backward/forward secrecy; RAFI5: scalability; RAFI6: collision attacks; RAFI7: dos attacks; RAFI8: replay attacks; RAFI9: stolen verifier attacks; RAFI10: de-synchronization attacks; RAFI11: man-in-the-middle attack; RAFI12: impersonation attack; RAFI13: message authentication; RAFI14: data confidentiality; RAFI15: insider attack”.
Comparison of the computational cost.
| Tag | Reader | Server | Total Operations | Execution Cost (ms) | |
|---|---|---|---|---|---|
| [ |
|
| 3 |
| 0.0161 |
| [ |
|
|
|
| 0.0276 |
| [ | 3 |
|
|
| 0.023 |
| [ |
|
|
|
| 0.0322 |
| [ |
|
|
|
| 0.0184 |
| [ |
|
|
|
| 0.0276 |
| Proposed |
| − |
|
| 0.0184 |
Figure 2Comparison of the computational cost.
Communication cost comparison with relevant frameworks.
| Communication Costs in Bits | No. of Messages | |
|---|---|---|
| [ | 2432 | 4 |
| [ | 1056 | 5 |
| [ | 1280 | 5 |
| [ | 1408 | 4 |
| [ | 896 | 4 |
| [ | 1792 | 4 |
| Proposed | 832 | 4 |
Figure 3Comparison of the computation cost.