In order to support robust implementation of IoT, many schemes have been done to provide privacy, anonymity, scalability and customizability. Ray et al.’s scheme and Mir et al.’s protocol are analyzed in this paper and suffer from tracing attacks. Ray et al.’s scheme is subjected to malicious impersonation attacks, and does not achieve strong forward untraceability. Then the improved protocol is proposed, which adapts quadratic residue theorem to offer better security, scalability and customizability. Finally, the improved protocol meets forward untraceability, backward untraceability and strong forward untraceability under the untraceability model, and resists reader impersonation attacks, tag impersonation attacks, and tracing attacks. The comparison results show that the improved protocol offers better security and scalability than the existing protocols.
Read full abstract