Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
<p>Radio Frequency Identification (RFID) System Architecture.</p> "> Figure 2
<p>Gope-Hwang’s proposed registration scheme.</p> "> Figure 3
<p>Gope-Hwang’s proposed authentication scheme.</p> "> Figure 4
<p>Registration phase of the proposed protocol.</p> "> Figure 5
<p>Proposed authentication protocol.</p> "> Figure 6
<p>ProVerif Simulation.</p> "> Figure 7
<p>Running Time of Proposed Scheme.</p> "> Figure 8
<p>Communication Cost.</p> ">
Abstract
:1. Introduction
- The security scheme should preserve user privacy and anonymity.
- The scheme should ensure forward and backward secrecy.
- The scheme should prevent insider attacks and replay attacks.
- The system should have capabilities to withstand impersonation and forgery attacks.
- The system should provide mutual authentication and thwart man in middle attack.
- The system should be user-friendly and should have the provision of updation and alteration of tag data at any time.
1.1. Motivations and Contributions
- Cryptanalysis of the baseline [3] protocol.
- Proposed an improved authentication protocol using only lightweight symmetric key primitives to overcome the security issues of the baseline protocol.
- Performed formal and informally security analysis of the proposed protocol.
- Solicited the comparison of the proposed protocol with related existing protocols with respect to security features.
- Accomplished the comparison of the proposed protocol with related existing protocols with respect to performance, including communication, as well as computation complexity.
1.2. Adversarial Model
- The public channel is under full control of , so that the can intercept, revert, modify, replay, or even send a fresh fabricated message.
- has the capability to extract some of the information of the tag by power analysis. However, shared key of the tag and Server is secret and is inaccessible to any adversary.
- can be any deceitful tag or an outsider of the system.
- The database attached to the Server is inaccessible, and no adversary can access the private key of the Server.
1.3. Road Map
1.4. Review of Baseline Protocol
1.5. Baseline Protocol Tag Registration Phase
- Step BLR 1:
- Each tag () submits to the Server S.
- Step BLR 2:
- S generates random number and computes . S then generates a set of unlikeable shadow identities , and , where the . S computes . Further, S generates a set of emergency keys , each of the keys corresponding to specific , where each . S then computes . Then S generates a 32-bit random sequence number and random number m and matches it with , . S then sends the to the through Reader by maintaining the copy of in its database for speeding up the authentication process. S authenticates the validity of RFID tag based on . If does not have a match within the record of S, it terminates the process. In this case, the RFID tag will use one of its fresh pair of the emergency key and shadow ID . The used pair of shadow ID and emergency ID () must be deleted from both, the Database Server S and the RFID tag . Database Server S again updates and send through a secure channel for further communication.
- Step BLR 3:
- , upon receiving message from S, stores in its memory.
1.6. Baseline Protocol Tag Authentication Phase
- Step BLA 1:
- with identifier generates random number , and derives , . The tag then computes and sends message request as to the Reader device . also receives a recently used sequence number from S for mutual authentication. In the case of synchronization loss, the tag uses one of its fresh pair . Subsequently, it is assigned to the as and then as . sends to the Reader .
- Step BLA 2:
- Upon receiving request from , Reader of the cluster (in which is located) generates random number and computes , . then sends to S for verification.
- Step BLA 3:
- When S receives a request from , first it validates the track sequence number by computing . S then derives and verifies . Upon successful verification of , S generates a random number m and assigns it to . S also computes , , to create a message and the S sends to . Finally, S computes and updates and . In case the message does not contain , then S randomly generates a new shared key using the emergency key and real identity of the tag . Then is computed and x is sent with the message , where is calculated as .
- Step BLA 4:
- receives and computes , and validates if it is equal to . Upon successful validation, sends to . Contrarily, the Reader terminates the session.
- Step BLA 5:
- , on receiving , computes and verifies its equality with . Upon success, derives and stores , for future communication.
1.7. Cryptanalysis of Baseline Protocol
1.7.1. Vulnerable to Collision Attack
1.7.2. Vulnerable to Stolen Verifier Attack
1.7.3. Vulnerable to DoS Attack
2. Proposed Scheme
2.1. Tags Registration Phase
- Step PTR 1:
- Each tag submits to the Server S.
- Step PTR 2:
- S generates a random number and computes . S generates randomly and computes one-time alias ’s identity by encrypting it with the Secret Key of S. S authenticates based on in authentication phase by checking if a request is valid or not. S stores and sends M to the RFID tag through a secure channel.
- Step PTR 3:
- Upon receiving the message from S, stores the information in its memory.
2.2. Tags Authentication Phase
- Step PTA 1:
- RFID tag with identifier generates a random number and derives and . The tag then initiates an authentication request request by sending to .
- Step PTA 2:
- Upon receiving the request from the tag, Reader of the cluster (in which tag is located) first verifies the timestamp freshness as . generates a random number and computes , . sends to the S for verification.
- Step PTA 3:
- When S receives the request from , first it verifies , then derives and . Further, S computes and verifies , . Then S verifies by decrypting it as . Upon successful verification, S computes and . S then updates and computes . S, finally, sends to .
- Step PTA 4:
- Upon receiving , checks freshness of the timestamp . computes and verifies its equality with the received . Upon success, sends to . Otherwise, terminates the session.
- Step PTA 5:
- Upon receiving , first checks freshness of the timestamp and upon success verifies the message . Then computes and updates , and saves the information for the next authentication process.
3. Security Analysis
3.1. BAN Logic-Based Formal Security Analysis
• Goal 1: Ri | • Goal 5: Ri |
• Goal 2: Ri | • Goal 6: Ri |
• Goal 3: Sj | • Goal 7: tag |
• Goal 4: Sj | • Goal 8: tag. |
- M1: Ri: ,
- M2: Sj: M1,
- M3: Ri: V3,V4,
- M4: .
• A1: | • A6: |
• A2: | • A7: |
• A3: | • A8: |
• A4: | • A9: . |
• A5: |
- S1: .
- S2: .
- S3: .
- S4: .
- S5: Ri (Goal 1).
- S6: Ri (Goal 2).
- S7: .
- S8: .
- S9: .
- S10: .
- S11: Sj (Goal 3).
- S12: Sj. (Goal 4).
- S13: .
- S14: .
- S15: .
- S16: .
- S17: Ri. (Goal 5).
- S18: Ri. (Goal 6).
- S19: .
- S20: .
- S21: .
- S22: .
- S23: (Goal 7).
- S24: (Goal 8).
3.2. Security Analysis with ProVerif
3.3. Informal Security Analysis
3.3.1. Mutual Authentication Between Tag And Server
3.3.2. Anonymity
3.3.3. Traceability
3.3.4. Backward/Forward Secrecy
3.3.5. Scalability
3.3.6. Collision Attack
3.3.7. DoS Attack
3.3.8. Replay Attacks
3.3.9. Location Tracking Attack
3.3.10. Impersonation Attacks (Forgery Attacks)
3.3.11. Stolen-Verifier Attacks
4. Comparative Analysis
4.1. Security Requirements
• SR1: Mutual authentication. | • SR7: DoS attacks. |
• SR2: Tag untraceability. | • SR8: Replay attacks. |
• SR3: Tag anonymity. | • SR9: Location tracking attack. |
• SR4: Backward/Forward secrecy. | • SR10: Forgery attack. |
• SR5: Scalability. | • SR11: Stolen-verifier attacks. |
• SR6: Collision attacks. |
4.2. Computation Cost Analysis
- CC: Computation cost;
- : CC of single hash function;
- : CC of symmetric encryption/decryption.
4.3. Communication and Storage Cost Analysis
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Rouse, M. Internet of Things (IoT). Available online: https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT (accessed on 3 September 2019).
- Gope, P.; Hwang, T. BSN-Care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 2016, 16, 1368–1376. [Google Scholar] [CrossRef]
- Gope, P.; Hwang, T. A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput. Secur. 2015, 55, 271–280. [Google Scholar] [CrossRef]
- Peris-Lopez, P.; Hernandez-Castro, J.C.; Estevez-Tapiador, J.M.; Ribagorda, A. Lightweight cryptography for low-cost RFID tags. In Security in RFID and Sensor Networks; CRC Press: London, UK, 2016; pp. 121–150. [Google Scholar]
- Gope, P.; Amin, R.; Islam, S.H.; Kumar, N.; Bhalla, V.K. Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener. Comput. Syst. 2018, 83, 629–637. [Google Scholar] [CrossRef]
- Kitsos, P. Security in RFID and Sensor Networks; CRC Press: New York, NY, USA, 2016. [Google Scholar]
- Hsu, C.H.; Wang, S.; Zhang, D.; Chu, H.C.; Lu, N. Efficient identity authentication and encryption technique for high throughput RFID system. Secur. Commun. Netw. 2016, 9, 2581–2591. [Google Scholar] [CrossRef]
- Simon, P.M.G.; Riggert, E.F.; Trivelpiece, S.E. System and Method for Reading RFID Tags Across a Portal. U.S. Patent 9,519,811, 13 December 2016. [Google Scholar]
- Wu, F.; Xu, L.; Kumari, S.; Li, X.; Das, A.K.; Shen, J. A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J. Ambient Intell. Humanized Comput. 2018, 9, 919–930. [Google Scholar] [CrossRef]
- Sidorov, M.; Ong, M.T.; Vikneswaran, R.; Nakamura, J.; Ohmura, R.; Khor, J.H. Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains. IEEE Access 2019, 7, 7273–7285. [Google Scholar] [CrossRef]
- Noman, A.T.; Hossain, S.; Islam, S.; Islam, M.E.; Ahmed, N.; Chowdhury, M.M. Design and Implementation of Microcontroller Based Anti-Theft Vehicle Security System using GPS, GSM and RFID. In Proceedings of the 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT), Dhaka, Bangladesh, 13–15 September 2018; pp. 97–101. [Google Scholar]
- Liao, Y.P.; Hsiao, C.M. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 2014, 18, 133–146. [Google Scholar] [CrossRef]
- Kim, H. RFID mutual authentication protocol based on synchronized secret. Int. J. Secur. Its Appl. 2013, 7, 37–50. [Google Scholar]
- Cha, J.R.; Kim, J.H. Novel anti-collision algorithms for fast object identification (RFID) system. In Proceedings of the 11th International Conference on Parallel and Distributed Systems, Washington, DC, USA, 20–22 July 2005; Volume 2, pp. 63–67. [Google Scholar]
- El Beqqal, M.; Azizi, M. Classification of major security attacks against RFID systems. In Proceedings of the International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), Fez, Morocco, 19–20 April 2017; pp. 1–6. [Google Scholar]
- Tewari, A.; Gupta, B. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput. 2017, 73, 1085–1102. [Google Scholar] [CrossRef]
- Ayaz, U.; Haq, T.A.; Taimour, S.; Mansoor, K.; Mahmood, S. An Enhanced Biometric Based RFID Authentication Scheme Defending Against Illegitimate Access. In Proceedings of the 14th International Conference on Emerging Technologies (ICET), Islamabad, Pakistan, 21–22 November 2018; pp. 1–6. [Google Scholar]
- Zhao, Z. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. J. Med. Syst. 2014, 38, 46. [Google Scholar] [CrossRef]
- Farash, M.S.; Nawaz, O.; Mahmood, K.; Chaudhry, S.A.; Khan, M.K. A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. J. Med. Syst. 2016, 40, 165. [Google Scholar] [CrossRef] [PubMed]
- Burmester, M.; De Medeiros, B.; Motta, R. Robust, anonymous RFID authentication with constant key-lookup. In Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, 18–19 March 2008; pp. 283–291. [Google Scholar]
- Cai, S.; Li, Y.; Li, T.; Deng, R.H. Attacks and improvements to an RIFD mutual authentication protocol and its extensions. In Proceedings of the second ACM conference on Wireless network security, Zurich, Switzerland, 16–19 March 2009; pp. 51–58. [Google Scholar]
- Gaubatz, G.; Kaps, J.P.; Ozturk, E.; Sunar, B. State of the art in ultra-low power public key cryptography for wireless sensor networks. In Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops, Kauai Island, HI, USA, 8–12 March 2005; pp. 146–150. [Google Scholar]
- Yang, J.; Park, J.; Lee, H.; Ren, K.; Kim, K. Mutual authentication protocol. In Proceedings of the Workshop on RFID and lightweight crypto, Graz, Austria, 14–15 July 2005. [Google Scholar]
- Kang, S.Y.; Lee, I.Y. A Study on low-cost RFID system management with mutual authentication scheme in ubiquitous. In Proceedings of the Asia-Pacific Network Operations and Management Symposium, Sapporo, Japan, 10–12 October 2007; pp. 492–502. [Google Scholar]
- Lee, L.S.; Fiedler, K.D.; Smith, J.S. Radio frequency identification (RFID) implementation in the service sector: A customer-facing diffusion model. Int. J. Prod. Econ. 2008, 112, 587–600. [Google Scholar] [CrossRef]
- Qingling, C.; Yiju, Z.; Yonghua, W. A minimalist mutual authentication protocol for RFID system & BAN logic analysis. In Proceedings of the International Colloquium on Computing, Communication, Control, and Management, CCCM, Guangzhou, China, 3–4 August 2008; Volume 2, pp. 449–453. [Google Scholar]
- Zhou, S.; Zhang, Z.; Luo, Z.; Wong, E.C. A lightweight anti-desynchronization RFID authentication protocol. Inf. Syst. Front. 2010, 12, 521–528. [Google Scholar] [CrossRef]
- Piramuthu, S. RFID mutual authentication protocols. Decis. Support Syst. 2011, 50, 387–393. [Google Scholar] [CrossRef]
- Safkhani, M.; Peris-Lopez, P.; Hernandez-Castro, J.C.; Bagheri, N. Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 2014, 259, 571–577. [Google Scholar] [CrossRef]
- Tan, C.C.; Sheng, B.; Li, Q. Secure and serverless RFID authentication and search protocols. IEEE Trans. Wirel. Commun. 2008, 7, 1400–1407. [Google Scholar] [CrossRef]
- Cho, J.S.; Jeong, Y.S.; Park, S.O. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Comput. Math. Appl. 2015, 69, 58–65. [Google Scholar] [CrossRef]
- Naeem, M.; Chaudhry, S.A.; Mahmood, K.; Karuppiah, M.; Kumari, S. A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things. Int. J. Commun. Syst. 2019. [Google Scholar] [CrossRef]
- Zhang, Z.; Qi, Q. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. J. Med. Syst. 2014, 38, 47. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Naqvi, H.; Farash, M.S.; Shon, T.; Sher, M. An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J. Supercomput. 2018, 74, 3504–3520. [Google Scholar] [CrossRef]
- Asgari, H.; Haines, S.; Rysavy, O. Identification of Threats and Security Risk Assessments for Recursive Internet Architecture. IEEE Syst. J. 2018, 12, 2437–2448. [Google Scholar] [CrossRef]
- Abbasinezhad-Mood, D.; Nikooghadam, M. An Anonymous ECC-Based Self-Certified Key Distribution Scheme for the Smart Grid. IEEE Trans. Ind. Electron. 2018, 65, 7996–8004. [Google Scholar] [CrossRef]
- Tan, H.; Ma, M.; Labiod, H.; Boudguiga, A.; Zhang, J.; Chong, P.H.J. A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks. IEEE Trans. Veh. Technol. 2016, 65, 9570–9584. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Kim, I.L.; Rho, S.; Farash, M.S.; Shon, T. An improved anonymous authentication scheme for distributed mobile cloud computing services. Cluster Comput. 2019, 22, 1595–1609. [Google Scholar] [CrossRef]
- Roy, S.; Chatterjee, S.; Das, A.K.; Chattopadhyay, S.; Kumari, S.; Jo, M. Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things. IEEE Internet Things J. 2018, 5, 2884–2895. [Google Scholar] [CrossRef]
- Jiang, Q.; Zeadally, S.; Ma, J.; He, D. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 2017, 5, 3376–3392. [Google Scholar] [CrossRef]
- Mahmood, K.; Naqvi, H.; Alzahrani, B.A.; Mehmood, Z.; Irshad, A.; Chaudhry, S.A. An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment. Int. J. Commun. Syst. 2018, 31, e3814. [Google Scholar] [CrossRef]
- Xu, Z.; Xu, C.; Chen, H.; Yang, F. A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurr. Comput. Pract. Exp. 2019, 31, e5295. [Google Scholar] [CrossRef]
- Xie, Q.; Hwang, L. Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city. Neurocomputing 2019, 347, 131–138. [Google Scholar] [CrossRef]
- Kyntaja, T. A Logic of Authentication by Burrows, Abadi and Needham; Science Helsinki University of Technology: Tehran, Iran; Available online: http://www.tml.tkk.fi/Opinnot/Tik-110.501/1995/ban.html (accessed on 13 July 2019).
- Blanchet, B. Modeling and verifying security protocols with the applied pi calculus and ProVerif. Found. Trends Privacy Secur. 2016, 1, 1–135. [Google Scholar] [CrossRef]
- Lumini, A.; Nanni, L. An improved biohashing for human authentication. Pattern Recognit. 2007, 40, 1057–1065. [Google Scholar] [CrossRef]
- Kilinc, H.H.; Yanik, T. A survey of SIP authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 2014, 16, 1005–1023. [Google Scholar] [CrossRef]
Features | Passive Tags | Active Tags |
---|---|---|
Data Storage | 128 bytes | 128 bytes |
tag Power | Energy transferred through Radio Frequency from Reader | Internal source to tag |
tag Battery | No | Yes |
Availability of Source Power | Only in range of Radar | Continuous |
Signal Strength required to tag | Very High | Very Low |
Range | Upto 3–5 M | Upto 100 M |
Multiple tag Reading | less then thousand tags within 3 M of Reader range | More then 1000 tags recognized upto 100 mph |
Notations | Description |
---|---|
T | RFID-tag |
R | Reader Device |
S | Database Server System |
ith tag identity | |
One-time tag alias identity | |
Shadow identity | |
jth Reader identity | |
tag Random number | |
Reader Random number | |
Shared key of Server and tag | |
Shared emergency key of Server and tag | |
Server and Reader shared secret key | |
Track sequence number (used by both S and T) | |
Randomly derived from Shadow-ID and Emergency Key | |
Hash function | |
⊕ | The exclusive XOR operation |
concatenation |
Notations | Description |
---|---|
P believes that X | |
P sees that X | |
P once said X | |
P have total jurisdiction on X | |
X is updated and fresh | |
X, Y is component of formula(X,Y) | |
X is combine with Y | |
Hash of message X using a key K | |
P and Q share key K for communication | |
is one time session key | |
Message-Meaning rule | |
Freshness-conjuncatenation rule | |
Nonce-verification rule | |
Jurisdiction rule | |
P believes X |
Requirements | Yang et al. [23] | Tan et al. [30] | Cai et al. [21] | Cho et al. [31] | Gope et al. [3] | Proposed Scheme |
---|---|---|---|---|---|---|
SR1 | × | × | √ | √ | √ | √ |
SR2 | × | × | × | √ | √ | √ |
SR3 | × | × | √ | × | √ | √ |
SR4 | × | √ | × | √ | √ | √ |
SR5 | × | × | × | × | √ | √ |
SR6 | × | × | × | √ | × | √ |
SR7 | √ | × | √ | √ | × | √ |
SR8 | √ | √ | √ | √ | √ | √ |
SR9 | √ | √ | √ | √ | √ | √ |
SR10 | √ | √ | √ | √ | √ | √ |
SR11 | √ | √ | √ | √ | × | √ |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mansoor, K.; Ghani, A.; Chaudhry, S.A.; Shamshirband, S.; Ghayyur, S.A.K.; Mosavi, A. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. Sensors 2019, 19, 4752. https://doi.org/10.3390/s19214752
Mansoor K, Ghani A, Chaudhry SA, Shamshirband S, Ghayyur SAK, Mosavi A. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. Sensors. 2019; 19(21):4752. https://doi.org/10.3390/s19214752
Chicago/Turabian StyleMansoor, Khwaja, Anwar Ghani, Shehzad Ashraf Chaudhry, Shahaboddin Shamshirband, Shahbaz Ahmed Khan Ghayyur, and Amir Mosavi. 2019. "Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography" Sensors 19, no. 21: 4752. https://doi.org/10.3390/s19214752
APA StyleMansoor, K., Ghani, A., Chaudhry, S. A., Shamshirband, S., Ghayyur, S. A. K., & Mosavi, A. (2019). Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. Sensors, 19(21), 4752. https://doi.org/10.3390/s19214752