A potential weakness in RFID-based Internet-of-things systems

被引:17
|
作者
Erguler, Imran [1 ]
机构
[1] TUBITAK BILGEM, TR-41470 Gebze, Kocaeli, Turkey
关键词
RFID; Internet of things; Authentication; Compromised reader; SECURITY; PRIVACY;
D O I
10.1016/j.pmcj.2014.11.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, a large body of research has been devoted to the security and privacy of RFID that is expected to become a critical component of IoT (Internet of Things). Most of these studies have been conducted under the assumption that an RFID system consists of the following elements: RFID tags, a reader and a back-end server. However, in IoT scenario it is supposed that a high density of RFID readers will be deployed and networked to the system over the Internet. Hence, a multi-reader RFID environment circumstance, where readers may be mobile handsets like mobile phones, should be involved in the security analysis of RFID based IoT systems. In this paper, we point out that RFID authentication protocols in the IoT need new security mechanisms that consider untrustworthy RFID entities, compromised readers or insecure communication channel between the readers and the back-end servers. Thus, traditional RFID security schemes designed for closed-loop systems cannot fulfill security and privacy demands, if they are directly adapted to the IoT environment. To emphasize this discrimination, we demonstrate that a secure protocol in a closed-loop RFID system may jeopardize the security of the system in this new RFID concept. Furthermore, we address this fault by investigating the security of a recent IoT RFID authentication protocol, named as AKE-MRFID. We exploit security flaws that have gone unnoticed in the design and present three attacks: de-synchronization, replay and reader impersonation attacks. To defend against the aforementioned attacks, we amend the protocol with a stateful variant so that it holds the claimed security properties. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:115 / 126
页数:12
相关论文
共 50 条
  • [31] Modeling of Secure Communication in Internet-of-Things for Resisting Potential Intrusion
    Fathima, Nasreen
    Banu, Reshma
    Ahammed, G. F. Ali
    [J]. COMPUTATIONAL STATISTICS AND MATHEMATICAL MODELING METHODS IN INTELLIGENT SYSTEMS, VOL. 2, 2019, 1047 : 389 - 398
  • [32] Programming UHF RFID Systems for the Internet of Things
    Colella, Riccardo
    Esposito, Alessandra
    Catarinucci, Luca
    Tarricone, Luciano
    [J]. IEEE ANTENNAS AND PROPAGATION MAGAZINE, 2016, 58 (02) : 109 - 119
  • [33] Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems
    Wolf, Marilyn
    Serpanos, Dimitrios
    [J]. PROCEEDINGS OF THE IEEE, 2018, 106 (01) : 9 - 20
  • [34] Architectural Survey on Internet-of-Things
    Bharti, Monika
    Kumar, Raj Esh
    Saxena, Sharad
    [J]. 2019 FIFTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP 2019), 2019, : 437 - 442
  • [35] How to Agentify the Internet-of-Things?
    Maamar, Zakaria
    Faci, Noura
    Boukadi, Khouloud
    Ugljanin, Emir
    Sellami, Mohamed
    Baker, Thar
    Angarita, Rafael
    [J]. 2018 12TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2018,
  • [36] Instrumentation and measurement in the Internet-of-Things
    Jardim-Goncalves, Ricardo
    [J]. IEEE INSTRUMENTATION & MEASUREMENT MAGAZINE, 2019, 22 (06) : 3 - 3
  • [37] The Obligatory Internet-of-Things Column
    Davidson, Scott
    [J]. IEEE DESIGN & TEST, 2014, 31 (04) : 71 - 72
  • [38] Connection models for the Internet-of-Things
    He, Kangli
    Hermanns, Holger
    Wu, Hengyang
    Chen, Yixiang
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (03)
  • [39] An Internet-of-Things Educational Platform
    Alsukayti, Ibrahim S.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (07): : 127 - 136
  • [40] Internet-of-things based approach for warehouse management system
    Kim, Jung-Yee
    Park, Doo-Jin
    [J]. International Journal of Multimedia and Ubiquitous Engineering, 2016, 11 (10): : 159 - 166