Cargando…

Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography

Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only ligh...

Descripción completa

Detalles Bibliográficos
Autores principales: Mansoor, Khwaja, Ghani, Anwar, Chaudhry, Shehzad Ashraf, Shamshirband, Shahaboddin, Ghayyur, Shahbaz Ahmed Khan, Mosavi, Amir
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6864817/
https://www.ncbi.nlm.nih.gov/pubmed/31683885
http://dx.doi.org/10.3390/s19214752
_version_ 1783471968102645760
author Mansoor, Khwaja
Ghani, Anwar
Chaudhry, Shehzad Ashraf
Shamshirband, Shahaboddin
Ghayyur, Shahbaz Ahmed Khan
Mosavi, Amir
author_facet Mansoor, Khwaja
Ghani, Anwar
Chaudhry, Shehzad Ashraf
Shamshirband, Shahaboddin
Ghayyur, Shahbaz Ahmed Khan
Mosavi, Amir
author_sort Mansoor, Khwaja
collection PubMed
description Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security.
format Online
Article
Text
id pubmed-6864817
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-68648172019-12-06 Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography Mansoor, Khwaja Ghani, Anwar Chaudhry, Shehzad Ashraf Shamshirband, Shahaboddin Ghayyur, Shahbaz Ahmed Khan Mosavi, Amir Sensors (Basel) Article Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security. MDPI 2019-11-01 /pmc/articles/PMC6864817/ /pubmed/31683885 http://dx.doi.org/10.3390/s19214752 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Mansoor, Khwaja
Ghani, Anwar
Chaudhry, Shehzad Ashraf
Shamshirband, Shahaboddin
Ghayyur, Shahbaz Ahmed Khan
Mosavi, Amir
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
title Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
title_full Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
title_fullStr Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
title_full_unstemmed Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
title_short Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
title_sort securing iot-based rfid systems: a robust authentication protocol using symmetric cryptography
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6864817/
https://www.ncbi.nlm.nih.gov/pubmed/31683885
http://dx.doi.org/10.3390/s19214752
work_keys_str_mv AT mansoorkhwaja securingiotbasedrfidsystemsarobustauthenticationprotocolusingsymmetriccryptography
AT ghanianwar securingiotbasedrfidsystemsarobustauthenticationprotocolusingsymmetriccryptography
AT chaudhryshehzadashraf securingiotbasedrfidsystemsarobustauthenticationprotocolusingsymmetriccryptography
AT shamshirbandshahaboddin securingiotbasedrfidsystemsarobustauthenticationprotocolusingsymmetriccryptography
AT ghayyurshahbazahmedkhan securingiotbasedrfidsystemsarobustauthenticationprotocolusingsymmetriccryptography
AT mosaviamir securingiotbasedrfidsystemsarobustauthenticationprotocolusingsymmetriccryptography