A Realistic Lightweight Authentication Protocol for Securing Cloud based RFID System

被引:0
|
作者
Surekha, B. [1 ]
Narayana, K. Lakshmi [2 ]
Jayaprakash, P. [2 ]
Vorugunti, Chandra Sekhar [3 ]
机构
[1] NBKR IST, Nellore 514415, India
[2] SITAMS, Chittoor 517127, India
[3] IIIT SriCity, Chittoor 517588, AP, India
关键词
Authentication; RFID; Cloud server; Security protocol; Privacymodel; CasperFDR; SCHEME;
D O I
10.1109/CCEM.2016.17
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
RFID is a wireless system which uses electromagnetic fields in identifying and tracking the tags attached to objects. Many researchers have proposed RFID based authentication schemes under the assumption that the back end server is trustworthy. This pre assumption is not found to be valid in cloud centered RFID scenarios where the tag data is outsourced to insecure third party cloud. In this context, in 2013, Xie et al had proposed a first of its kind of cloud based RFID authentication scheme. In 2015, Abughazalah et al has presented that Xie et al scheme is susceptible to reader impersonation attack, tag location tracking attack and proposed an improved version. After detailed analysis, we will demonstrate that Abughazalah et al scheme still lacks to accomplish tag location privacy. As a portion of our contribution, we propose a cloud centered RFID authentication scheme, which is robust and resistant to the above attacks. We formally evaluate the security strong points of our scheme using widely recognized CasperFDR tool.
引用
收藏
页码:54 / 60
页数:7
相关论文
共 50 条
  • [1] A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
    Gope, Prosanta
    Hwang, Tzonelih
    [J]. COMPUTERS & SECURITY, 2015, 55 : 271 - 280
  • [2] Cloud-based Lightweight RFID Mutual Authentication Protocol
    Fan, Kai
    Luo, Qi
    Li, Hui
    Yang, Yintang
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 333 - 338
  • [3] Cloud-based lightweight secure RFID mutual authentication protocol in IoT
    Fan, Kai
    Luo, Qi
    Zhang, Kuan
    Yang, Yintang
    [J]. INFORMATION SCIENCES, 2020, 527 : 329 - 340
  • [4] RFID lightweight authentication protocol based on PRF
    Jin, Yongming
    Wu, Qiying
    Shi, Zhiqiang
    Lu, Xiang
    Sun, Limin
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1506 - 1514
  • [5] On a Lightweight Authentication Protocol for RFID
    Nastase, George-Daniel
    Tiplea, Ferucio Laurentiu
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 212 - 225
  • [6] Lightweight RFID Authentication Protocol for Cloud Services using PUF Encryption
    Ye Qiao
    Sun ZiWen
    [J]. PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 5629 - 5634
  • [7] SKINNY-Based RFID Lightweight Authentication Protocol
    Xiao, Liang
    Xu, He
    Zhu, Feng
    Wang, Ruchuan
    Li, Peng
    [J]. SENSORS, 2020, 20 (05)
  • [8] Lightweight Bidirectional Authentication Protocol for RFID
    He, Jiaqi
    Peng, Changgen
    Fu, Zhangjie
    Xu, Dequan
    Tang, Hanlin
    [J]. Computer Engineering and Applications, 2023, 59 (18) : 268 - 277
  • [9] A Lightweight Authentication Protocol for Mobile RFID
    Pan, Tao
    Zuo, Kai-Zhong
    Wang, Tao-Chun
    Deng, Chun-Hong
    [J]. International Journal of Network Security, 2024, 26 (02) : 190 - 199
  • [10] Enhancements to a Lightweight RFID Authentication Protocol
    Zhang, Xiaowen
    Zhang, Zhanyang
    Wei, Xinzhou
    [J]. ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 454 - +