Skip to main content
Top
Published in: The Journal of Supercomputing 8/2021

22-01-2021

A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment

Authors: Mohd Shariq, Karan Singh

Published in: The Journal of Supercomputing | Issue 8/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of Things (IoT) is a novel paradigm that connects several physical devices and the cyber world over the Internet. IoT technology is growing rapidly and soon will have an enormous innovation in our daily lives. With the increasing number of connected IoT devices making our daily lives more convenient, it puts personal data at serious risk too. Radio frequency identification (RFID) contributes to IoT applications in the automatic identification of the connected devices. However, the primary concerns with the RFID tag connected devices are their security and privacy. The communication channel is deemed to be wireless or insecure between the tags and the readers, which makes RFID system vulnerable to the various known attacks. To deal with these security flaws, we have put forward a novel vector-space-based lightweight RFID authentication protocol for IoT environment named VLPRAP. The proposed protocol integrates vector space, linear mapping and basis mechanism that achieves secure authentication and improves security and privacy without increasing the computational cost. The correctness of the proposed VLPRAP protocol has been validated using BAN logic inference rules. The formal and informal security analysis demonstrates that our proposed protocol resists various malicious security threats, providing better security and higher efficiency. Furthermore, the performance analysis of our proposed protocol has been measured in terms of computation operations, storage requirement and communication overhead, which shows that better performance as compared to related existing protocols.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Industr Inf 14(4):1656–1665CrossRef Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Industr Inf 14(4):1656–1665CrossRef
3.
go back to reference Hu P, Ning H, Qiu T, Zhang Y, Luo X (2017) Fog computing-based face identification and resolution scheme in internet of things. IEEE Trans Ind Informat 13(4):1910–1920CrossRef Hu P, Ning H, Qiu T, Zhang Y, Luo X (2017) Fog computing-based face identification and resolution scheme in internet of things. IEEE Trans Ind Informat 13(4):1910–1920CrossRef
4.
go back to reference Wang KH, Chen CM, Fang W, Wu TY (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74(1):65–70CrossRef Wang KH, Chen CM, Fang W, Wu TY (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74(1):65–70CrossRef
5.
go back to reference Rostampour S, Bagheri N, Hosseinzadeh M, Khademzadeh A (2018) A scalable and lightweight grouping proof protocol for internet of things applications. J Supercomput 74(1):71–86CrossRef Rostampour S, Bagheri N, Hosseinzadeh M, Khademzadeh A (2018) A scalable and lightweight grouping proof protocol for internet of things applications. J Supercomput 74(1):71–86CrossRef
6.
go back to reference Alamr AA, Kausar F, Kim J, Seo C (2018) A secure ECC-based RFID mutual authentication protocol for internet of things. J Supercomput 74(9):4281–4294CrossRef Alamr AA, Kausar F, Kim J, Seo C (2018) A secure ECC-based RFID mutual authentication protocol for internet of things. J Supercomput 74(9):4281–4294CrossRef
7.
go back to reference Salem FM, Amin R (2020) A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Inf Sci 527:382–393MathSciNetCrossRef Salem FM, Amin R (2020) A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Inf Sci 527:382–393MathSciNetCrossRef
8.
go back to reference Chen X, Geng D, Zhai J, Liu W, Zhang H, Zhu T (2020) Security analysis and enhancement of the most recent RFID protocol for telecare medicine information system. Wireless Person Commun Chen X, Geng D, Zhai J, Liu W, Zhang H, Zhu T (2020) Security analysis and enhancement of the most recent RFID protocol for telecare medicine information system. Wireless Person Commun
9.
go back to reference Juels A (2006) RFID security, and privacy: a research survey. IEEE J Sel Areas Commun 24:381–394CrossRef Juels A (2006) RFID security, and privacy: a research survey. IEEE J Sel Areas Commun 24:381–394CrossRef
10.
go back to reference Miorandi D, Sicari S, Pellegrini FD, Chlamtac I (2012) Internet of things: Vision, applications and research challenges. Ad Hoc Netw 10:1497–1516CrossRef Miorandi D, Sicari S, Pellegrini FD, Chlamtac I (2012) Internet of things: Vision, applications and research challenges. Ad Hoc Netw 10:1497–1516CrossRef
11.
go back to reference Doss R, Sundaresan S, Zhou W (2013) A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw 11:383–396CrossRef Doss R, Sundaresan S, Zhou W (2013) A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw 11:383–396CrossRef
12.
go back to reference Aghili SF, Mala H, Kaliyar P, Conti M (2019) SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT. Future Gener Comput Syst 101:621–634CrossRef Aghili SF, Mala H, Kaliyar P, Conti M (2019) SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT. Future Gener Comput Syst 101:621–634CrossRef
14.
go back to reference Fan K, Zhu S, Zhang K, Li H, Yang Y (2019) A lightweight authentication scheme for cloud-based RFID healthcare systems. IEEE Netws 33(2):44–49CrossRef Fan K, Zhu S, Zhang K, Li H, Yang Y (2019) A lightweight authentication scheme for cloud-based RFID healthcare systems. IEEE Netws 33(2):44–49CrossRef
15.
go back to reference Safkhani M, Rostampour S, Bendavid Y, Bagheri N (2020) IoT in medical & pharmaceutical: designing lightweight RFID security protocols for ensuring supply chain integrity. Comput Netw 181:107558CrossRef Safkhani M, Rostampour S, Bendavid Y, Bagheri N (2020) IoT in medical & pharmaceutical: designing lightweight RFID security protocols for ensuring supply chain integrity. Comput Netw 181:107558CrossRef
16.
go back to reference Fan K, Wang W, Jiang W, Li H, Yang Y (2018) Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Netw Appl 11(4):723–734CrossRef Fan K, Wang W, Jiang W, Li H, Yang Y (2018) Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Netw Appl 11(4):723–734CrossRef
17.
go back to reference Fan K, Jiang W, Luo Q, Li H, Yang Y (2019) Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV. J Franklin Inst Fan K, Jiang W, Luo Q, Li H, Yang Y (2019) Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV. J Franklin Inst
18.
go back to reference Fan K, Kang J, Zhu S, Li H, Yang Y (2019) Permutation matrix encryption based ultralightweight secure RFID scheme in internet of vehicles. Sensors 19(1):152CrossRef Fan K, Kang J, Zhu S, Li H, Yang Y (2019) Permutation matrix encryption based ultralightweight secure RFID scheme in internet of vehicles. Sensors 19(1):152CrossRef
19.
go back to reference Kumar V, Ahmad M, Mishra D, Kumari S, Khan MK (2020) RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Vehicul Commun 22:100213CrossRef Kumar V, Ahmad M, Mishra D, Kumari S, Khan MK (2020) RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Vehicul Commun 22:100213CrossRef
20.
go back to reference Safkhani M, Camara C, Peris-Lopez P, Bagheri N (2020) RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing. Vehicul Commun, 100311 Safkhani M, Camara C, Peris-Lopez P, Bagheri N (2020) RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing. Vehicul Commun, 100311
21.
go back to reference Lee C-C, Li C-T, Cheng C-L, Lai Y-M (2019) A novel group ownership transfer protocol for RFID systems. Ad Hoc Netw 91:101873CrossRef Lee C-C, Li C-T, Cheng C-L, Lai Y-M (2019) A novel group ownership transfer protocol for RFID systems. Ad Hoc Netw 91:101873CrossRef
22.
go back to reference Karmakar NC (2011) Handbook of smart antennas for RFID systems. Wiley Karmakar NC (2011) Handbook of smart antennas for RFID systems. Wiley
23.
go back to reference He D, Zeadally S (2015) An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J 2:72–83CrossRef He D, Zeadally S (2015) An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J 2:72–83CrossRef
24.
go back to reference Gope P, Hwang T (2015) A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput Secur 55:271–280CrossRef Gope P, Hwang T (2015) A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput Secur 55:271–280CrossRef
25.
go back to reference Gope P, Amin R, Islam SH, Kumar N, Bhalla VK (2018) Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener Comput Syst 83:629–637CrossRef Gope P, Amin R, Islam SH, Kumar N, Bhalla VK (2018) Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener Comput Syst 83:629–637CrossRef
26.
go back to reference Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems, security in pervasive computing lecture notes in computer science, pp 201–212 Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems, security in pervasive computing lecture notes in computer science, pp 201–212
27.
go back to reference Yang J, Park J, Lee H, Ren K, Kim K (2005) Mutual authentication protocol for low-cost RFID. WRLC, In Workshop on RFID and Lightweight Crypto, pp 17–24 Yang J, Park J, Lee H, Ren K, Kim K (2005) Mutual authentication protocol for low-cost RFID. WRLC, In Workshop on RFID and Lightweight Crypto, pp 17–24
28.
go back to reference Piramuthu S (2011) RFID mutual authentication protocols. Decis Support Syst 50(2):387–393CrossRef Piramuthu S (2011) RFID mutual authentication protocols. Decis Support Syst 50(2):387–393CrossRef
29.
go back to reference Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In:Proceedings of 2nd Workshop on RFID Security Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In:Proceedings of 2nd Workshop on RFID Security
30.
go back to reference Peris-Lopez P, Hernandez-Castro JC, Estevez-TapiadorJM, Ribagorda A (2006) M2AP: a minimalist mutual-authentication protocol for low-cost RFID Tags, ubiquitous intelligence and computing lecture notes in computer science, pp 912–923 Peris-Lopez P, Hernandez-Castro JC, Estevez-TapiadorJM, Ribagorda A (2006) M2AP: a minimalist mutual-authentication protocol for low-cost RFID Tags, ubiquitous intelligence and computing lecture notes in computer science, pp 912–923
31.
go back to reference Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) EMAP: an efficient mutual-authentication protocol for low-cost RFID tags, on the move to meaningful internet systems 2006: OTM 2006 snce, pp 352–361 Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) EMAP: an efficient mutual-authentication protocol for low-cost RFID tags, on the move to meaningful internet systems 2006: OTM 2006 snce, pp 352–361
32.
go back to reference Li T, Wang G (2007)Security analysis of two ultra-lightweight RFID authentication protocols, new approaches for security, privacy and trust in complex environments IFIP International federation for information processing, pp 109–120 Li T, Wang G (2007)Security analysis of two ultra-lightweight RFID authentication protocols, new approaches for security, privacy and trust in complex environments IFIP International federation for information processing, pp 109–120
33.
go back to reference Chien H-Y (2007) SASI: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secure Comput 4:337–340CrossRef Chien H-Y (2007) SASI: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secure Comput 4:337–340CrossRef
34.
go back to reference Phan R-W (2009) cryptanalysis of a new ultralightweight RFID sol—SASI. IEEE Trans Dependable Secure Comput 6:316–320CrossRef Phan R-W (2009) cryptanalysis of a new ultralightweight RFID sol—SASI. IEEE Trans Dependable Secure Comput 6:316–320CrossRef
35.
go back to reference Peris-Lopez P, Hernandez-Castro JC, Tapiador JME, Ribagorda A (2009) Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol, Information Security Applications Lecture Notes in Computer Science, pp 56–68 Peris-Lopez P, Hernandez-Castro JC, Tapiador JME, Ribagorda A (2009) Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol, Information Security Applications Lecture Notes in Computer Science, pp 56–68
36.
go back to reference Bilal Z, Masood A, Kausar F (2009) Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol, International Conference on Network-Based Information Systems, pp 260–267 Bilal Z, Masood A, Kausar F (2009) Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol, International Conference on Network-Based Information Systems, pp 260–267
37.
go back to reference Zuo Y (2009) Secure and private search protocols for RFID systems. Inform Syst Front 12:507–519CrossRef Zuo Y (2009) Secure and private search protocols for RFID systems. Inform Syst Front 12:507–519CrossRef
38.
go back to reference Piramuthu S (2012) Vulnerabilities of RFID protocols proposed in ISF. Information Systems Frontiers 14(3):647–651CrossRef Piramuthu S (2012) Vulnerabilities of RFID protocols proposed in ISF. Information Systems Frontiers 14(3):647–651CrossRef
39.
go back to reference Tian Y, Chen G, Li J (2012) A New Ultralightweight RFID Authentication Protocol with Permutation. IEEE Commun Lett 16:702–705CrossRef Tian Y, Chen G, Li J (2012) A New Ultralightweight RFID Authentication Protocol with Permutation. IEEE Commun Lett 16:702–705CrossRef
40.
go back to reference Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on RAPP ultralightweight authentication protocol. Inform Process Lett 113:205–209MathSciNetCrossRef Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on RAPP ultralightweight authentication protocol. Inform Process Lett 113:205–209MathSciNetCrossRef
41.
go back to reference Gao L, Ma M, Shu Y, Wei Y (2014) An ultralightweight RFID authentication protocol with CRC and permutation. J Netw Comput Appl 41:37–46CrossRef Gao L, Ma M, Shu Y, Wei Y (2014) An ultralightweight RFID authentication protocol with CRC and permutation. J Netw Comput Appl 41:37–46CrossRef
42.
go back to reference Akgün M, Ҫaǧlayan MU (2013) On the security of recently proposed RFID protocols. IACR Cryptol ePrint Arch, 820 Akgün M, Ҫaǧlayan MU (2013) On the security of recently proposed RFID protocols. IACR Cryptol ePrint Arch, 820
43.
go back to reference Khan GN, Moessner M (2014) Low-cost authentication protocol for passive, computation capable RFID tags. Wireless Netw 21:565–580CrossRef Khan GN, Moessner M (2014) Low-cost authentication protocol for passive, computation capable RFID tags. Wireless Netw 21:565–580CrossRef
44.
go back to reference Fan K, Ge N, Gong Y, Li H, Su R, Yang Y (2016) An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw Appl 10:368–376CrossRef Fan K, Ge N, Gong Y, Li H, Su R, Yang Y (2016) An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw Appl 10:368–376CrossRef
45.
go back to reference Aghili SF, Mala H (2019) Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce. Int J Commun Syst 32(3):e3837CrossRef Aghili SF, Mala H (2019) Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce. Int J Commun Syst 32(3):e3837CrossRef
46.
go back to reference Safkhani M, Bagheri N, Shariat M (2018) On the security of rotation operation based ultra-lightweight authentication protocols for RFID systems. Future Internet 10(9):82CrossRef Safkhani M, Bagheri N, Shariat M (2018) On the security of rotation operation based ultra-lightweight authentication protocols for RFID systems. Future Internet 10(9):82CrossRef
47.
go back to reference Lipschutz S, Lipson M (2009) Schaum's outline of theory and problems of linear algebra. Erlangga Lipschutz S, Lipson M (2009) Schaum's outline of theory and problems of linear algebra. Erlangga
49.
go back to reference Avoine G (2005) Adversarial model for radio frequency identification. Technical Report, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC) Avoine G (2005) Adversarial model for radio frequency identification. Technical Report, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC)
50.
go back to reference Alomair B, Clark A, Cuellar J, Poovendran R (2012) Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans Parallel Distrib Syst 23:1536–1550CrossRef Alomair B, Clark A, Cuellar J, Poovendran R (2012) Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans Parallel Distrib Syst 23:1536–1550CrossRef
51.
go back to reference Burrows M, AbadiM, Needham R (1989) A logic of authentication. In: Proceedings of the twelfth ACM symposium on operating systems principles–SOSP 89 Burrows M, AbadiM, Needham R (1989) A logic of authentication. In: Proceedings of the twelfth ACM symposium on operating systems principles–SOSP 89
Metadata
Title
A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment
Authors
Mohd Shariq
Karan Singh
Publication date
22-01-2021
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 8/2021
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03550-1

Other articles of this Issue 8/2021

The Journal of Supercomputing 8/2021 Go to the issue

Premium Partner