Literature DB >> 35590800

RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure.

Vikas Kumar1, Rahul Kumar1, Akber Ali Khan2, Vinod Kumar3, Yu-Chi Chen4,5, Chin-Chieh Chang6.   

Abstract

The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have a significant impact on our daily lives. While the growing number of linked IoT devices makes our daily lives easier, it also puts our personal data at risk. In IoT applications, Radio Frequency Identification (RFID) helps in the automatic identification of linked devices, and the dataflow of the system forms a symmetry in communication between the tags and the readers. However, the security and privacy of RFID-tag-connected devices are the key concerns. The communication link is thought to be wireless or insecure, making the RFID system open to several known threats. In order to address these security issues, we propose a robust authentication framework for IoT-based RFID infrastructure. We use formal security analysis in the random oracle model, as well as information analysis to support the claim of secure communication. Regarding the desirable performance characteristics, we describe and analyze the proposed framework's performance and compare it to similar systems. According to our findings, the proposed framework satisfies all security requirements while also improving the communication.

Entities:  

Keywords:  IoT; RFID; authentication; random oracle model; security

Year:  2022        PMID: 35590800      PMCID: PMC9099869          DOI: 10.3390/s22093110

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

An RFID infrastructure has a symmetric nature. The RFID system is a wireless technology that is used to identify remote objects that have RFID tags embedded in them. RFID technology is utilized in a variety of applications, including transportation, supply chain management, livestock management, e-passport, e-payment, and patient healthcare [1,2,3]. Backend readers, servers, and tags are all a part of a conventional RFID system whose architecture is symmetric, since the dataflow is in one direction from the tag, reader to server, and then, the inverse Table 5. The lack of physical contact between the reader and the tags is a crucial element of RFID systems, and the following are some of the benefits of using them: RFID tags are small and inexpensive, and radio frequency communication can recognize large numbers of RFID tags at the same time [4,5]. RFID systems, on the other hand, are exposed to a variety of security attacks and privacy exposure concerns due to their use of wireless communication and signal broadcasting techniques. It is difficult to apply a comprehensive cryptographic algorithm to an RFID system due to the strictly limited calculation resources, tiny storage capacity, and weak power supply of low-cost tags, and these issues are impeding the rapid development of this technology [6]. RFID security is fundamentally concerned with authentication and privacy issues. A secure protocol running RFID tags and readers can provide authentication. If a tag contains unique secret information and the RFID reader and RFID tag can convince the RFID reader that they both have that information, the tagged product is considered to be authentic and the person has access to it. Tag anonymity is one of the most important features that any RFID-based authentication technique aspires to attain, and tag untraceability, which ensures the privacy of the tag or the mobility of a user wearing an RFID tag, is a more satisfactory property of tag anonymity. To achieve this attribute, a tag must encode its original identity using a cryptographic primitive such as a one-way secure collision-resistant hash function in existing state-of-the-art authentication protocols. RFID is the simplest form of pervasive sensor network and is widely used for object identification [7]. RFID systems are made up of a tag with a transceiver that sends and receives radio signals from connected devices [8,9]. The RFID reader is another device that acts as an access point and can receive and deliver messages to transceivers. The reader is also in charge of ensuring that tag information is available at the application level [10]. IoT-based RFID tags can be of the passive or active type. The differences between these tags are summarized in Table 1.
Table 1

IoT-based RFID tag features’ comparison.

FeaturesActive TagsPassive Tags
Data Storage128 bytes128 bytes
Tag BatteryYesNo
RangeUp to 100 MUp to 3–5 M
Multiple Tag ReadingMore then 1000 tags recognized up to 100 mphLess than a thousand tags within 3 M of the reader’s range
Signal Strength Required to TagVery lowVery high
Tag PowerInternal source to tagEnergy transferred through radio frequency from the reader
Availability of Source PowerContinuousOnly in range of radar

1.1. Related Work

In recent years, numerous exciting anonymous IoT-based RFID authentication and key agreement frameworks have been proposed, which can be classified into Public Key Cryptosystem- (PKC) and Non-Public Key Cryptosystem- (NPKC) based authenticated schemes. These approaches are unsuitable for tiny powered tags due to the modular exponential operations. Hash-based RFID systems, on the other hand, would be the best choice among NPKCs because of their low computational overhead [7,11,12,13]. Yang et al. [11] introduced an authentication mechanism based on a one-way secure collision-resistant hash function and exclusive-OR, claiming that it addressed all of the security vulnerabilities that occur in RFID systems. Unfortunately, the protocol is vulnerable to many attacks, including “man-in-the-middle”, forgeries, and loss of untraceability [14]. Cho et al. [13] developed a secure hash-based authentication framework, claiming that it addresses all of the security, privacy, and forgery difficulties that exist in RFID communication systems. However, Safkhani et al. [15] recently demonstrated that the protocol does not meet the authors’ security promises. In their paper, they cryptanalyzed Cho et al.’s [13] protocol and concluded that it is vulnerable to “de-synchronization or DoS attacks, tag impersonation attacks, and reader impersonation attacks”. Furthermore, they showed in their paper that all proposed lightweight authentication techniques based on one-way hash functions and exclusive-OR are impracticable [11,12,13,16,17]. Ayaz et al. [18] suggested another mutual authentication approach for secure RFID communication systems utilizing only symmetric key cryptography operations. In this framework, an authentication is accomplished on the basis of user biometrics’ verification in their protocol. Liu et al. [19] proposed an authentication protocol for an RFID system by using hash and XoR operations. The correctness of the protocol was proven by using “Burrows–Abadi–Needham (BAN)” logic analysis. Mansoor et al. [20] proposed a securing IoT-based authentication protocol for RFID systems by using a symmetric cryptography approach. Unfortunately, we studied their protocol and found the security weaknesses of their protocol. Furthermore, Mansoor et al. [20] showed that the protocol proposed by Gope et al. [21] is vulnerable to collision attacks, DoS attacks, and stolen verifier attacks. In 2022, Gao and Lu pretested a new ultra-lightweight RFID authentication protocol in passive RFID systems [22]. The proposed protocol, they claimed, prevents numerous known attacks, beats several existing ultra-lightweight protocols in terms of computational cost, storage requirements, and communication costs, and is efficient in terms of the computational cost, storage requirements, and communication costs. Wang et al. suggested a protocol [23] for which they had formal and informal discussions about security and privacy. Xiaomei et al. discussed [24] the RFID logic of an event-based authentication framework for secure communication. Shariq et al. proposed an RFID-based anonymous and secure framework for deployment in IVs [25]. Wei et al. proposed an improved security authentication protocol for lightweight RFID based on ECC [26]. Arslan and Bingöl presented the security and privacy analysis of recently proposed ECC-based RFID authentication schemes [27].

1.2. Adversary Model

Our adversary model is based on the threat model of [28], which is well-known and widely recognized. By altering, monitoring, deciding on, and introducing information into the communications channel, the attacker can not only see the communications channel, but also capture session keys, confidential documents, and private keys stored in the contributor memory through explicit attacks. Many assaults, such as replay attacks, man-in-the-middle attacks, impersonation attacks, etc., are now possible in the RFID system due to the utilization of public communication networks and wireless communication networks. As a result, the privacy and security issues are major concerns in RFID frameworks. Thus, an authentication and key management mechanism is required to validate the legitimacy of specified entities.

1.3. Security Requirements for an IoT-Based RFID Communication System

As far as we know and based on the available literature, many authentication protocols for RFID communication systems have been presented during the last few years. In RFID systems, authentication and key agreement are the best approaches to make them suitable for a wide range of applications. During the transmission of messages between RFID tags and RFID readers, many types of security attacks may occur. We outline various security needs in light of these issues, such as forward security, mutual authentication, anonymity, scalability, confidentiality, untraceability,“ man-in-the-middle attack, insider attack, replay attack, impersonation attack”, etc., to provide secure communication for the RFID system. Such requirements are utilized as the criteria for assessing the RFID system in order to provide a secure and efficient authentication protocol. The following security criteria should be met by any authentication scheme that attempts to secure a practical RFID-based system: Mutual authentication: This is the most important aspect of any authentication mechanism. Furthermore, mutual authentication must be achieved in the presence of all three RFID system participants. The authentication process takes place between the backend database server and the RFID tag. Messages are sent between the tag, reader, and server over an unsecured communication channel. Tag anonymity: To minimize forgery and ensure security, this is the most important and necessary security requirement. Furthermore, if an opponent is unable to trace an RFID tag during message delivery over a public channel, the RFID authentication system maintains its anonymity. Anonymity can be divided into two categories: strong anonymity and weak anonymity. Furthermore, in IoT communication, the participants involved do not disclose their real identity in order to defend their security and privacy. Message authentication: In Internet operations, this maintains the integrity of message communication. Untraceability: In the RFID communication system, untraceability means that no one can trace the behavior patterns of the participants involved and their forwarded messages. Session key agreement: Following the successful implementation of the proposed protocol, a session key agreement will be established between users with their mobile devices and the network control center for future communication. Confidentiality: Encrypting shared secrets on the public channel ensures the security of RFID communications between the tag and reader. Perfect forward secrecy: Perfect forward secrecy is a technique that should be used in the authentication protocol design to give secrecy to previously communicated messages, where an opponent who discovers the entities private and public keys will be unable to derive a past session key. Scalability: The approach is not scalable if the server conducts an extensive search to verify a tag. Worse, an opponent may conduct a timing attack [29] against the protocol, which can identify a tag based on how long it took the server to authenticate it. To maintain scalability, an authentication strategy should avoid any exhaustive search operations. Availability: In an RFID system, the authentication and key agreement procedure runs all the time between the RFID tag and RFID backend database server. In most authentication methods, the shared secret information between the RFID tag and RFID backend database server must be updated to achieve the attribute of accessibility. However, security risks such as Denial-Of-Service (DoS) or de-synchronization attacks may disrupt this process. The RFID system’s efficiency may be harmed as a result of these concerns. Thus, when designing an authentication protocol, this issue should be considered. Impersonation attack: An adversary could try to mimic legitimate protocol participants (such as the cloud database server, RFID reader, or RFID tag) by replaying a message captured from the channels. Any impersonation should be avoided at all costs. Replay attack: An outsider attempts to confuse other certified participants by restating intercepted data in this attack. This attack targets a user whose information is intercepted by an uncertified third party. Man-in-the-middle attack: An adversary listens in on transmitted data and then attempts to delete or manipulate the contents of the data sent to receivers in this attack. Insider attack: Any insider can play the role of adversary in the RFID communication system. De-synchronization attack: An adversary may generate desynchronization problems if a protocol authentication is based on shared values. The server may be unable to verify the tag in the future if the shared data are updated by the server, but the tag is not. De-synchronization attempts should be avoided.

1.4. Motivation and Contribution

Many authentication and key agreement frameworks for RFID systems have been presented during the last few decades, as far as we know and based on the existing literature [13,16,17,19,20,21]. However, a suitable authenticated key agreement protocol for RFID systems that is secure and efficient for RFID systems is missing. RFID systems require an authenticated key agreement scheme because of their varying computing capabilities and privacy requirements. Thus, we propose an authenticated key agreement protocol for RFID communication systems. Table 2 shows the comparative study of the advantages and disadvantages of other protocols with respect to our suggested protocol. The following are some notable characteristics of the proposed framework:
Table 2

Merits and demerits of the existing authentication protocols in RFID environments.

ProtocolsApproach UsedPublished YearMeritsDemerits
Tan et al. [16]Hash function2008Provides backward and forward secrecySusceptible to replay attack, insider attack,
and de-synchronizationDoS attack, and tag anonymity problem
Cai et al. [17]Hash function2009Provides a mutual authentication andVulnerable to impersonation attack,
anonymity and secure against stolen verifier attackinsider attack, and DoS attack
Cho et al. [13]Hash function2015Provides a mutual authentication and tag untraceabilityProne to insider attack, man-in-the-middle attack
and secure against stolen verifier attacksand impersonation attack
Gope and Hwang [21]Hash function2015Prevents replay attacks, de-synchronization,Vulnerable to collision attacks,
and man-in-the-middle attackDoS attacks, and impersonation attack
Liu et al. [19]Hash function2018Provides mutual authentication,Susceptible to stolen verifier attacks,
tag untraceability, and tag anonymitycollision attacks, and DoS attacks
Mansoor et al. [20]Hash function2019Attains mutual authentication, scalability,Vulnerable to impersonation attack, man-in-
and data confidentialitythe-middle attack, collision attack, and replay attack
We propose a robust authentication protocol that supports key agreement between RFID tags and the database server for IoT-based RFID infrastructure. We give a thorough explanation of the informal security study, proving that the suggested protocol can resist a variety of well-known security attacks. The proposed protocol security is formally demonstrated using a random oracle model. The proposed the RAFI has desirable security features that make the proposed protocol robust and efficient, according to the proof of security. The results of the performance evaluation and comparison show that the proposed RAFI has desirable performance features. Merits and demerits of the existing authentication protocols in RFID environments.

1.5. Organization of the Paper

The remainder of the proposed framework is organized as follows: Section 2 covers the fundamentals of the mathematics. The proposed framework is discussed in Section 3. In Section 4, the proposed framework security is evaluated. Section 5 includes a performance study of the proposed framework. Finally, the findings are summarized in the Section 5.4.

2. Mathematical Preliminaries

The notations and terminology used in the RAFI are defined in this section.

2.1. Notations

As shown in Table 3, the following notations are utilized.
Table 3

Notations.

SymbolDescription
Ti ith RFID tag
Rj jth RFID reader
Bitwise XoR operation
h(·) Cryptographic one-way hash function
xS Secret key of S
S Database server
T Maximum time delay in communication
Concatenation operation
SKij(.) Session key agreement between entities i and j
i=?j Whether i equals j
A Adversary
Approximate value
IDTi The identity of the ith tag
i···j:{M} i sends message M to j via a secure channel
i···j:{M} i sends message M to j via a public channel

2.2. Cryptography Materials

Here, various cryptographic primitives that are used to design the proposed security protocol are discussed. In this regard, we make use of lightweight cryptographic primitives to ensure security and computational efficiency.

2.2.1. Cryptographic Hash Function

The hash operation takes a variable-length message (M) as the input and outputs a fixed string result H(M), which is known as the message digest. In practice, reversing this process is nearly impossible. As a result, this function is referred to as a collision-resistant one-way hash function. Following that, our system integrity will be protected using the Secure Hash Algorithm (SHA-256). The one-way collision-resistant hash function [30,31,32] takes an input and returns an output of definite length n of a message. The advantage of any for calculating the collision is as follows: Advantage , and and represent the set of computedby attacker . The probability of this advantage is thus calculated across the random choice values made by with the run duration t. Hash function is collision-resistant if , where .

2.2.2. XoR Cipher

In cryptography, the XoR operation includes some postulates: , , , and .

3. The Proposed Protocol

The steps in the proposed framework are as follows: “ registration phase of RFID with database server” and “login and authentication phase”. The architecture of the proposed protocol given the Figure 1.
Figure 1

Architecture of the RAFI.

3.1. Registration Phase

The following are the instructions for registering the RFID tag with the database server. The detailed of this phase also mentioned in Table 4.
Table 4

Registration phase of RFID tag.

Tag Ti  Database Server S
Inputs IDTi
Sends MRi1={IDTi}
················Generates sequence number SNi for Ti
Computes S1=IDSh(IDTiSNixS)
Where xS is the private key of S
Computes S2=h(S1IDTi)IDTi
Stores S1,S2,SNi in the database
Sends MR2i2={S1,S2,SNi,h(.)}
upon receiving MR2i2················
Stores {S1,S2,SNi} in the database
To register with database server S, tag inputs and, then, via a secure channel. Upon receiving , it generates sequence number for and computes where is private key for S. Furthermore, the data server computes . Finally, S stores in the database and sends towards the tag via a secure medium. Upon receiving , the RFID tag stores parameters in the database for further communication via a secure medium.

3.2. Login and Authentication Phase

successfully registers with S, and when she/he wants to use the service, she/he makes an access request to S. The following is a description of the procedure in steps. Further, The detailed of this phase also mentioned in Table 5.
Table 5

Login and authentication phase of RFID.

RFID Tag TiRFID Reader RjDatabase Server S
Generates random value r
Computes r1=r(S1S2)
Computes H1=h(IDTiS1S2)
Computes H11=H1S2
Sends M1={r1,H11,T1}
················Verifies T2T1T
Sends M2={r1,H11,T3}
················Verifies T4T3T
Computes H1*=H1S2
Verifies H1*=?H11
Computes r*=r1(S1S2)
Generates random value r2
Computes SKS=h(IDSIDTir*
r2SNiS1S2T5)
Computes H2=h(S1S2r*)
Computes H22=H2(r*S2)
Computes K1=IDTih(r*SNiH1*)
Encrypts E1=EK1(H22,r2,IDS,T5)
Sends M3={E1,T5}
················
Verifies T6T5T
Sends M4={M3,T7}
················
Verifies T8T7T
Computes K2=IDTih(rSNiH1)
Decrypts (H22,r2,IDS,T5)=DK2(E1)
Computes H2*=H22(rS2)
Verifies H2*=?H2
Computes SKT=h(IDSIDTirr2SNiS1S2T5)
generates random value r and computes the following values , , . Furthermore, . Upon receiving , RFID reader verifies and . Upon receiving , S verifies . Then, S computes and verifies ; if this condition does not hold, then it terminates the process; otherwise, S computes , generates a random value , computes the link of computations , , , , and encrypts . Finally, . Upon receiving , verifies . Furthermore, . Upon receiving , verifies and decrypts with the help of computed key . Furthermore, it computes and verifies . Finally, Tag sets the session key for furter communication as . Hence, session key agreement .

4. Security Analysis

The security analysis of the proposed protocol is conducted by a formal method and an informal method as follows.

4.1. Informal Security Analysis

The following is an informal security analysis of the proposed protocol.

4.1.1. Key Freshness

In the proposed protocol, the session key contains the timestamp and a freshly generated random number. Furthermore, in the authentication procedure, the timestamp and random number are distinct for each session. The uniqueness of these parameters confirms the session’s unique key. Thus, the unique key for each session confirms the key freshness property of the proposed protocol.

4.1.2. Untraceability

If a cryptographic scheme has two features, it is untraceable. is unable to distinguish between users’ initial identities; is unable to determine whether two distinct sessions starting at different times belong to the same user. Thus, it is intended that both properties be maintained.

4.1.3. Session Key Agreement

In the proposed scheme, the database server calculates and the RFID tag computes . Thus, . Thus, the proposed protocol maintains the said cryptographic property.

4.1.4. Session Key Verification

The RFID tag verifies its session key in our proposed system as , where and , embedded with many secret credentials. Therefore, the proposed technique allows for the verification of session keys.

4.1.5. Scalability

In the proposed protocol for the RFID system, the RFID server S does not perform an exhaustive process to authenticate each RFID tag. The RFID server S, on the other hand, validates the RFID tag and reacts immediately to it. This increases the scalability of the proposed protocol.

4.1.6. Forward Secrecy

Given that the proposed protocol only uses symmetric key cryptography, i.e., the secure collision-resistant hash function, and we do not update the shared parameters per session, it is not possible to give this property, similar to any other protocol in this context. It should be emphasized that if the protocol employs a public key primitive, this attribute can be simply provided.

4.1.7. Traceability and Anonymity

In the proposed protocol, the exchanged messages are and . In these messages, excluding and , which are the timestamps and cannot be connected to any identity to trace or compromise its anonymity, the rest of the information is encrypted values or the output of the one-way hash function and from one session to another session is randomized by fresh nonce values. Hence, the exchanged messages do not reveal any information to trace the tag or server or compromise their anonymity.

4.1.8. Replay Attack

Random numbers and timestamps are common countermeasures in replay attacks. However, in the proposed protocol, both of them are present. The timestamp condition checks , where is the valid period, and , where a, b are fresh random numbers and q is a large prime number.

4.1.9. Privileged Insider Attack

In the proposed protocol, interacting participants and a third party do not maintain any verifier repository. The authentication procedure is performed by participants using their unique secret keys. Thus, the proposed protocol resiststhe stolen verifier and insider threats.

4.1.10. Man-in-the-Middle Attack

The protocol is secure against the man-in-the-middle attack. The adversary is not successful in obtaining the key and pseudonym value. Furthermore, hash functions ensure message integrity, and timestamps control the session time; therefore, any message modification or unexpected delay by a “man-in-the-middle attack” will be detected with a high probability. In the proposed protocol, we verify conditions on both sides, and . As a result, the proposed protocol is protected from the “man-in-the-middle attack”.

4.1.11. Impersonation Attack

To impersonate the RFID tag, the attacker should either perform a replay attack or generate a valid . However, the replay attack is not feasible in this proposed protocol, and the attacker also has no chance to compute a valid , because it does not have access to . The same logic can be applied to an impersonating server. Hence, the proposed framework is safe from impersonation attacks.

4.1.12. De-Synchronization Attack

There is no secret sharing between the RFID tags and the RFIF backend server in the proposed protocol. Furthermore, no value needs to be updated in each authentication session. Thus, our suggested protocol is resistant to the de-synchronization attack.

4.1.13. Parallel Session Attack

When an reprocesses past messages in an insecure channel to compose a new request, this is known as a parallel session attack. To retrieve the key, impersonates the user tag . The secret credentials, which are used to compute the content, must be known by before user may compute a valid login request or execute the session key. It is apparent from the preceding study that is unable to obtain the session key. Hence, the proposed framework protects against the parallel session attack.

4.2. Formal Security Analysis

In this section, the random oracle model is deployed to demonstrate that the beacons exchanged in the proposed protocol are robust against any form of eavesdropping, and hence, the communicating entities can trust each other as they communicate over insecure channels.

4.2.1. Handshake Model

The handshake stage is used to exchange information and perform device synchronization amongst the participants. This is also the point at which the server takes control of the process and maintains it until the user is authenticated. At this level, the input is in the form of a classical medium, but the output is in the form of a quantum medium. The handshake stage is used to exchange information and perform device synchronization amongst the participants. This is also the point at which the server takes control of the process and maintains it until the user is authenticated. At this level, the input is in the form of a classical medium, but the output is in the form of a quantum medium. The handshake authentication model for the proposed RFID protocol shown in the Table 6.
Table 6

Challenge: handshake authentication for the RAFI.

RFID Tag TiRFID Reader RjDatabase Server S
Challenge
················
Challenge
················
Response
················
Success then
Response
················
Success

4.2.2. Formal Security Model

The formal model for the propose framework, which is based on the random oracle model, is discussed in this section [33,34]. We made some changes to the original to make it work with the proposed framework. We employed three participants to demonstrate our proof, , and S as the RFID tag, the RFID reader, and the database server. is the identity of T. Similarly, is the identity of S. is the identities’ dictionary. More information about this model may be found in [35].

4.2.3. Formal Security Proof

In this part, we show the proposed framework’s formal security using a model [28] based on the random oracle model [33,34]. In this model, an adversary can interact with framework entities, say , which is a server. Suppose that For the proof of this theorem, we introduce the game of series, initially with GM0 the real attack, and stop with GM5 where has no advantage. The details of these are explained as below in GM0 to GM5. Further, the simulation queries based on this random oracle model are ginen in Table 7. □
Table 7

Simulation of oracles.

Simulation Queries
Hash queries hn(m), n = 0, 1, 2, 3, 4, 5. If (m,hvn) exists in the index list of Lhn, the value hvn will be returned.Otherwise, the generated random value will be added to the index list Lhn.
Computes r1=r(S1S2)
Computes H1=h(IDTiS1S2)
Computes H11=H1S2
Then, it answers with M1={r1,H11,T1}
For the send(V,{r1,H11,T1} query, the G oracle simulates the following steps:
Verifies T2T1T
Then, it answers with M2={r1,H11,T3}
For send(G,{r1,H11,T3} query, the V oracle simulates the following steps:
Computes H1*=H1S2
Verifies H1*=?H1
Computes r*=r1(S1S2)
Generates random value r2
Computes SKS=h(IDSIDTir*r2SNiS1S2T5)
Computes H22=H2(r*S2)
Computes K1=IDTih(r*SNiH1*)
Encrypts E1=EK1(H22,r2,IDS,TS)
Then, it answers with M3={E1,T5}
For the send(V,{E1,T5} query, the oracle simulate the following steps
Verifies T6T5T
Then, it answer with M4={M3,T7}
For send(G,{M3,T7} query, the T oracle simulates the following steps:
Verifies T8T7T
Computes K2=IDTih(rSNiH1)
Decrypts (H22,r2,IDS,TS)=DK2(E1)
Computes H2*=H22(rS2)
Verifies H2*=?H2
Computes SKT=h(IDSIDTirr2SNiS1S2T5)
For an Execute (Ti,Rt,Sj) query, all Send queries are consecutively completed.
Massage (M1,M2,M3,M4) is the output.
For a Reveal(IK) query, if the chance IK has been settled and provided a safe session key, output SKT or SKS; otherwise, ⊥ is the response.
For a Corrupt(IK) query, all the information of IK is returned.
For a Test(IK) query, if IK is not fresh, return ⊥; otherwise, a coin γ is tossed.
If γ=0, the output is a random value with length l.
If γ=1, the conclusion is the appropriate session key.
The execution of Game GM0 is the same as the real attack in the oracle model. We have Different queries are conducted in GM1, and the results of the queries are kept in the oracle lists, making it impossible for an attacker to distinguish between the two oracle games. As a result, we have The execution of GM2 is like GM1, except that GM2 stops when a collision is present in the hash function and information messages. Therefore, the birth day paradox, the probability of collision in the transcript is at most [36], and the success probability of secure hash function collision is at most . Hence, we have The simulation of is identical to that of , with the exception that will be terminated if guesses the verifier operations without knowing the random oracle. Until the server grid fails in a legitimate authentication request, and the preceding game are different. As a result, we have is the same as , except that only the test inquiry of stops when adversary discloses a to obtain the real identity or sends a query to obtain the password information. Therefore, we conclude that The execution of is the same as , except that only of will stop when adversary publishes a secure hash inquiry with , because by utilizing the secure hash inquiry obtains the SK with success probability . Therefore, we have Thus, does not contain a favorable advantage in perceiving the actual from an arbitrary random one without making a hash query with the true input, . Adding every one of these probabilities, we can conclude that the theorem is proven. Simulation of oracles.

5. Performance Analysis

The performance analysis of the proposed framework compared to related frameworks [13,16,17,19,20,21] is given in three subsections: comparison of the security and functionality features and the computational and communication cost comparisons. The conclusion of the performance analysis demonstrates that the proposed framework has better efficiency and security in RFID communication systems.

5.1. Comparison of the Security and Functionality Features

The features that an authentication protocol is supposed to have are known as security requirements. These properties or needs must be guaranteed by every authentication protocol. The suggested protocol was compared to current protocols based on these requirements. The features/requirements examined for the comparison analysis are listed below. In Table 8, we summarize the security properties of the proposed framework and those schemes that are available in literature [13,16,17,19,20,21]. The related schemes can be seen with different security shortcomings against various security attacks.
Table 8

Comparison security and functionality features.

Security Features [16] [17] [13] [21] [19] [20]Proposed
RAFI1 ×
RAFI2 ×××
RAFI3 ×××
RAFI4 ×××
RAFI5 ××××
RAFI6 ×××××
RAFI7 ×××××
RAFI8 ××××
RAFI9 ××
RAFI10 ×
RAFI11 ××××
RAFI12 ××××
RAFI13 ××
RAFI14 ××××
RAFI15 ××××

Note ⇒ ×: not secure against the attack; ✓: secure against the attack; “RAFI1: mutual authentication; RAFI2: tag untraceability; RAFI3: tag anonymity; RAFI4: backward/forward secrecy; RAFI5: scalability; RAFI6: collision attacks; RAFI7: dos attacks; RAFI8: replay attacks; RAFI9: stolen verifier attacks; RAFI10: de-synchronization attacks; RAFI11: man-in-the-middle attack; RAFI12: impersonation attack; RAFI13: message authentication; RAFI14: data confidentiality; RAFI15: insider attack”.

5.2. Comparison of the Computational Cost

We calculated the computational cost of the RAFI and compared it to other frameworks [13,16,17,19,20,21], which is illustrated in Table 9. The computation time of the execution of hash operation () was 0.0023 ms, while the computation time of the execution of the encryption and decryption () was 0.0046 ms. The experiment was conducted on an Ubuntu system with a 2.20 GHz Intel dual-core Pentium CPU with a 2048 MB processor and RAM [20,37].
Table 9

Comparison of the computational cost.

TagReaderServerTotal OperationsExecution Cost (ms)
[16] 2Th 2Th 3Th 4Th 0.0161
[17] 4Th 2Th 6Th 12Th 0.0276
[13]3Th 2Th 5Th 10Th 0.023
[21] 5Th 2Th 7Th 14Th 0.0322
[19] 2Th 2Th 4Th 8Th 0.0184
[20] 2Th 2Th 4Th+2TE/D 8Th+2TE/D 0.0276
Proposed 2Th+TE/D 2Th+TE/D 4Th+2TE/D 0.0184
The protocol presented in [16] incurred 2, 2, and 3 for each RFID tag, RFID reader, and database server, respectively, and the total computational cost in their protocol was 4. In the same way, the protocols’ computational cost was provided in [17] to be 4, 2, and 6 for each RFID tag, RFID reader, and database server, respectively, for each participant, totaling 12. The computational cost presented in [13] was 3, 2, and 5 for each participant, totaling 10. The computational cost in [21] was 5 for the RFID tag, 2 for the reader, and 7 for the database serve; therefore, the total computational cost in their framework was 14. The computational cost in [19] for the RFID tag was 2, for the RFID reader was 2, and for the database server was 4; therefore, the total computational cost in their framework was 8. The protocol presented in [20] required 2, 2, and 4 for each RFID tag, RFID reader, and database server, respectively, and its total computational cost was 8. Furthermore, we computed the computational cost of the proposed framework, which required for the RFID tag and for the database side ; thus, the total computational cost of the operations of the proposed framework was . The results based on the comparison given in Table 9 are also visualized in Figure 2.
Figure 2

Comparison of the computational cost.

5.3. Communication Cost Comparison

In Table 10, we compute the communication cost of our proposed protocol and other existing protocols [13,16,17,19,20,21]. After that, in Figure 3, we compare the communication costs of the proposed framework to those of different frameworks in the same environment. This demonstrates that the suggested framework has less communication cost than alternative frameworks [13,16,17,19,20,21]. Furthermore, we computed the communication cost of every framework as under a random number, timestamp, and identity taking 64 bits. Here, we used 160 bits for the hash function message digest (SHA-1) and 256 bits for symmetric key encryption/decryption (AES-256).
Table 10

Communication cost comparison with relevant frameworks.

Communication Costs in BitsNo. of Messages
[16]24324
[17]10565
[13]12805
[21]14084
[19]8964
[20]17924
Proposed8324
Figure 3

Comparison of the computation cost.

5.4. Conclusions

In this paper, we proposed a unique hash-based lightweight authentication framework for IoT-based RFID communication environments, after a thorough examination of the various types of RFID authentication and key agreement protocols and their benefits and drawbacks. For secure authentication between valid participants, the protocol uses a hash function and the XoR operations mechanism. We were able to minimize the computational cost of the authentication process by using this technique. When we compared it to other current protocols, our proposed protocol provided improved security while consuming less communication, computational, and storage resources. In the future, the suggested framework could be used in IoT applications such as medical privacy protection, the Internet of Vehicles (IoV), smart city environments, and healthcare systems.
  1 in total

1.  Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.

Authors:  Khwaja Mansoor; Anwar Ghani; Shehzad Ashraf Chaudhry; Shahaboddin Shamshirband; Shahbaz Ahmed Khan Ghayyur; Amir Mosavi
Journal:  Sensors (Basel)       Date:  2019-11-01       Impact factor: 3.576

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.