Abstract

Internet of Things (IoT) is a new paradigm that has been evolving into the wireless sensor networks to expand the scope of networked devices (or things). This evolution drives communication engineers to design secure and reliable communication at a low cost for many network applications such as radio frequency identification (RFID). In the RFID system, servers, readers, and tags communicate wirelessly. Therefore, mutual authentication is necessary to ensure secure communication. Normally, a central server supports the authentication of readers and tags by distributing and managing the credentials. Recent lightweight RFID authentication protocols have been proposed to satisfy the security features of RFID networks. Using a serverless RFID system is an alternative solution to using a central server. In this model, both the reader and the tag perform mutual authentication without the need for the central server. However, many security challenges arise from implementing lightweight authentication protocols in serverless RFID systems. We propose a new secure serverless RFID authentication protocol based on the famous elliptic curve cryptography (ECC). The protocol also maintains the confidentiality and privacy of the messages, tag information, and location. Although most of the current serverless protocols assume secure channels in the setup phase, we assume an insecure environment during the setup phase between the servers, readers, and tags. We ensure that the credentials can be renewed by any checkpoint server in the mobile RFID network. Thus, we implement ECC in the setup phase (renewal phase), to transmit and store the communication credentials of the server to multiple readers so that the tags can perform the mutual authentication successfully while far from the server. The proposed protocol is compared with other serverless frameworks proposed in the literature in terms of computation cost and attacks resistance.

Highlights

  • Radio frequency identification (RFID) is a technology that allows us to detect items through electromagnetic waves

  • RFID is the new alternative to physical barcodes, which is widely being used for products inventory and asset tracking

  • As an RFID network carries along sensitive information, and passive tags have limited resources, many security protocols have been implemented at a minimal computational cost using simple operations

Read more

Summary

Introduction

Radio frequency identification (RFID) is a technology that allows us to detect items through electromagnetic waves. On reader is aisreceiver thatthat works as a as scanner to collect data from tag.the. The continualdevelopment developmentof of system the introduction of the ofconcept of RFID, where the communication between the reader and tag does not involve a central server. Serverless RFID, where the communication between the RFID reader and tag does not involve a This becomes necessity if theaobjects are ifmobile and destined fromand the destined server. This innovative scheme central server.aThis becomes necessity the objects are mobile from the server This raised significant security issues in the system because both the reader and tag should innovative scheme raised significant security issues in the RFID system because both the readerform and an autonomous communication venue.

Related Work
Heavyweight Protocols
Simple-Weight Protocols
Lightweight Protocols
Ultra-Lightweight Protocols
System Model
Network Model
Serverless Model
Proposed Protocol
Setup Phase
Authentication Phase
Recovery Phase
Security Analysis
Mutual Authentication
Privacy and Confidentiality
Forward and Backward Secrecy
Availability
Scalability
Analysis of Security Requirements
Replay Attack
Man-In-The-Middle Attack
Traceability Attack
Impersonate Attack
Desynchronization Attack
Denial of Service Attack
Analysis of Computation Cost
Analysis of Communication Cost
Formal Verification
Adversary Model
Reachability and Secrecy
Correspondence Assertion
Conclusions
Methods
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call