Abstract
With the development of wireless Internet of Things (IoT) devices, Radio frequency identification (RFID) has been used as a promising technology for the proliferation and communication in IoT networks. However, the RFID techniques are usually plagued with security and privacy issues due to the inherent weaknesses of underlying wireless radio communications. Although several RFID authentication mechanisms have been proposed to address the security concerns in RFID, most of them are still vulnerable to some active attacks, especially the jamming attack. This paper therefore proposes a novel self-adaptive authentication mechanism with a robust key updating, in order to tackle the security vulnerabilities of key updating algorithms and their inability to jamming attacks. Furthermore, we assess the performance and applicability of our solution with a thorough simulation by taking into account the energy consumption and authentication failure rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ge, M., Bangui, H., Buhnova, B.: Big data for internet of things: a survey. Future Gener. Comput. Syst. 87, 601–614 (2018)
Mbarek, B., Meddeb, A., Ben Jaballah, W., Mosbah, M.: A secure electric energy management in smart home. Int. J. Commun. Syst. 30(17) (2017)
Memos, V.A., Psannis, K.E., Ishibashi, Y., Kim, B.-G., Gupta, B.B.: An efficient algorithm for media-based surveillance system (EAMSUS) in IoT smart city framework. Future Gener. Comput. Syst. 83, 619–628 (2018)
Luo, H., Wen, G., Su, J., Huang, Z.: SLAP: succinct and lightweight authentication protocol for low-cost RFID system. Wirel. Netw. 24(1), 69–78 (2018)
Adame, T., Bel, A., Carreras, A., Melià-Seguí, J., Oliver, M., Pous, R.: CUIDATS: an RFID-WSN hybrid monitoring system for smart health care environments. Future Gener. Comput. Syst. 78, 602–615 (2018)
Bangui, H., Ge, M., Buhnova, B.: Exploring big data clustering algorithms for internet of things applications. In: Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security, IoTBDS 2018, Madeira, Portugal, pp. 269–276 (2018)
Stepanek, P., Ge, M.: Validation and extension of the smart city ontology. In: Proceedings of the 20th International Conference on Enterprise Information Systems, ICEIS 2018, Madeira, Portugal, pp. 406–413 (2018)
Naija, Y., Beroulle, V., Machhout, M.: Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tag. J. Electron. Test. 34(3), 291–304 (2018)
Dimitriou, T.: A secure and efficient RFID protocol that could make big brother (partially) obsolete. In: Pervasive Computing and Communications (2006)
Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219 (2004)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Security in Pervasive Computing, pp. 201–212 (2004)
Lu, L., Han, J., Hu, L., Liu, Y., Ni, L.M.: Dynamic key-updating: privacy-preserving authentication for RFID systems. In: Pervasive Computing and Communications, pp. 13–22 (2007)
Ohkubo, M., Suzuki, K., Kinoshita, S., et al.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop, vol. 82 (2003)
Tewari, A., Gupta, B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using RFID tags. J. Supercomput. 73(3), 1085–1102 (2017)
Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: International Workshop on Selected Areas in Cryptography, pp. 276–290 (2005)
Baashirah, R., Abuzneid, A.: Survey on prominent RFID authentication protocols for passive tags. Sensors 18(10) (2018)
Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y.: Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106, 117–123 (2018)
Liu, B., Su, X.: An anti-collision algorithm for rfid based on an array and encoding scheme. Information 9(3), 63 (2018)
Downard, I.T.: Simulating sensor networks in ns-2. Technical report
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Mbarek, B., Ge, M., Pitner, T. (2020). Self-adaptive RFID Authentication for Internet of Things. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_92
Download citation
DOI: https://doi.org/10.1007/978-3-030-15032-7_92
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15031-0
Online ISBN: 978-3-030-15032-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)