A potential weakness in RFID-based Internet-of-things systems

被引:17
|
作者
Erguler, Imran [1 ]
机构
[1] TUBITAK BILGEM, TR-41470 Gebze, Kocaeli, Turkey
关键词
RFID; Internet of things; Authentication; Compromised reader; SECURITY; PRIVACY;
D O I
10.1016/j.pmcj.2014.11.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, a large body of research has been devoted to the security and privacy of RFID that is expected to become a critical component of IoT (Internet of Things). Most of these studies have been conducted under the assumption that an RFID system consists of the following elements: RFID tags, a reader and a back-end server. However, in IoT scenario it is supposed that a high density of RFID readers will be deployed and networked to the system over the Internet. Hence, a multi-reader RFID environment circumstance, where readers may be mobile handsets like mobile phones, should be involved in the security analysis of RFID based IoT systems. In this paper, we point out that RFID authentication protocols in the IoT need new security mechanisms that consider untrustworthy RFID entities, compromised readers or insecure communication channel between the readers and the back-end servers. Thus, traditional RFID security schemes designed for closed-loop systems cannot fulfill security and privacy demands, if they are directly adapted to the IoT environment. To emphasize this discrimination, we demonstrate that a secure protocol in a closed-loop RFID system may jeopardize the security of the system in this new RFID concept. Furthermore, we address this fault by investigating the security of a recent IoT RFID authentication protocol, named as AKE-MRFID. We exploit security flaws that have gone unnoticed in the design and present three attacks: de-synchronization, replay and reader impersonation attacks. To defend against the aforementioned attacks, we amend the protocol with a stateful variant so that it holds the claimed security properties. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:115 / 126
页数:12
相关论文
共 50 条
  • [1] Smart Home Mobile RFID-based Internet-Of-Things Systems and Services
    Darianian, Mohsen
    Michael, Martin Peter
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 116 - 120
  • [2] Autonomous Wearable RFID-Based Sensing Platform for the Internet-of-Things
    Lemey, Sam
    Agneessens, Sam
    Van Torre, Patrick
    Baes, Kristof
    Rogier, Hendrik
    Vanfleteren, Jan
    [J]. 2017 INTERNATIONAL APPLIED COMPUTATIONAL ELECTROMAGNETICS SOCIETY SYMPOSIUM - ITALY (ACES), 2017,
  • [3] RF-Localize: An RFID-based Localization Algorithm for Internet-of-Things
    Manaffam, Saeed
    Jabalameli, Amirhossein
    [J]. 2016 ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2016, : 840 - 844
  • [4] QSA: Query Splitting-Based Anticollision for Mobile RFID-Based Internet-of-Things
    Gao, Jianliang
    Wang, Jianxin
    He, Jianbiao
    Wang, Weiping
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [5] The Social Internet of Things and the RFID-based Robots
    Turcu, Cristina
    Turcu, Cornel
    [J]. IV INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS 2012 (ICUMT), 2012, : 77 - 83
  • [6] Home Automation and RFID-Based Internet of Things Security: Challenges and Issues
    Fatima, Haram
    Khan, Habib Ullah
    Akbar, Shahzad
    [J]. Security and Communication Networks, 2021, 2021
  • [7] Health Systems with Resilient Reporting based on Internet-of-Things
    Melo, Yuri
    Borges, Vinicius C. M.
    Oliveira-Jr, Antonio
    Dalmazo, Bruno L.
    Riker, Andre
    [J]. IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 353 - 357
  • [8] A lightweight secure authentication approach based on stream ciphering for RFID-based Internet of Things
    Ghasemi, Fereshteh
    Babaie, Shahram
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [9] Computer Information Processing System Based on RFID Internet-of-Things Encryption Technology
    Yuan, Chunyan
    [J]. SCIENTIFIC PROGRAMMING, 2022, 2022
  • [10] Continuous Authentication in Internet-of-Things Systems
    Matiushin, I.
    Korkhov, V.
    [J]. PHYSICS OF PARTICLES AND NUCLEI, 2024, 55 (03) : 621 - 623