URASP: An ultralightweight RFID authentication scheme using permutation operation

被引:25
|
作者
Shariq, Mohd [1 ]
Singh, Karan [1 ]
Maurya, Pramod Kumar [2 ]
Ahmadian, Ali [3 ,4 ]
Ariffin, Muhammad Rezal Kamel [5 ]
机构
[1] JNU, Sch Comp & Syst Sci, New Delhi, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
[3] Natl Univ Malaysia, UKM, Inst IR 4 0, Bangi 43600, Malaysia
[4] Wenzhou Kean Univ, Sch Math Sci, Wenzhou, Peoples R China
[5] Univ Putra Malaysia, Inst Math Res, Seri Kembangan 43400, Upm, Malaysia
关键词
Ultralightweight; RFID; Security and privacy; Authetication; Permutation; OWNERSHIP TRANSFER; SECURITY ANALYSIS; PROTOCOL; IOT; IDENTIFICATION; VERIFICATION; ENVIRONMENT; PRIVACY; ATTACK;
D O I
10.1007/s12083-021-01192-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to low-cost, ease of use and convenience, Radio Frequency IDentification (RFID) is a contactless technology that has become more and more promising for automatic identification of an object and people without physical contact. However, the RFID system faces major issues related to its security and privacy, where an adversary may eavesdrop, temper, modify, and intercept the transmitted messages over a communication channel. To overcome these issues, there is a flexible and effective way to implement an ultralightweight RFID scheme. Therefore, we present an ultralightweight RFID authentication scheme using permutation operation named URASP in this paper. Our proposed scheme integrates permutation and left rotate operation to provide a higher level of security and privacy without increasing storage and computation overhead. In addition, the informal analysis of our proposal illustrates its ability to overcome all known security attacks. We show that the proposed URASP scheme preserves the properties of tags untraceability and information privacy by using Juels and Weis privacy model. The performance analysis has been performed which demonstrates that the proposed scheme outperforms other existing schemes as well as utilizes fewer resources on tags. The verification of our scheme has been done using Scyther simulation tool. Thereafter, the correctness of our scheme has been verified by using BAN logic inference rules. Hence, the proposed scheme is more suited for low-cost passive RFID tags.
引用
收藏
页码:3737 / 3757
页数:21
相关论文
共 50 条
  • [1] URASP: An ultralightweight RFID authentication scheme using permutation operation
    Mohd Shariq
    Karan Singh
    Pramod Kumar Maurya
    Ali Ahmadian
    Muhammad Rezal Kamel Ariffin
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 3737 - 3757
  • [2] An ultralightweight RFID authentication protocol with CRC and permutation
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Wei, Yuhua
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 37 - 46
  • [3] A New Ultralightweight RFID Authentication Protocol with Permutation
    Tian, Yun
    Chen, Gongliang
    Li, Jianhua
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (05) : 702 - 705
  • [4] Ultralightweight RFID Authentication Protocol Based on Permutation Matrix Encryption
    Hang, Tinghui
    Ding, Yong
    Wang, Zhen
    Wang, Huijiao
    [J]. 2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 417 - 423
  • [5] Weaknesses in a new ultralightweight RFID authentication protocol with permutation-RAPP
    Bagheri, Nasour
    Safkhani, Masoumeh
    Peris-Lopez, Pedro
    Tapiador, Juan E.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 945 - 949
  • [6] An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems
    Kumar, Anand
    Singh, Karan
    Shariq, Mohd
    Lal, Chhagan
    Conti, Mauro
    Amin, Ruhul
    Chaudhry, Shehzad Ashraf
    [J]. COMPUTER COMMUNICATIONS, 2023, 205 : 147 - 157
  • [7] On Ultralightweight RFID Authentication Protocols
    D'Arco, Paolo
    De Santis, Alfredo
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (04) : 548 - 563
  • [8] Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles
    Fan, Kai
    Kang, Junbin
    Zhu, Shanshan
    Li, Hui
    Yang, Yintang
    [J]. SENSORS, 2019, 19 (01)
  • [9] An Enhanced Ultralightweight RFID Authentication Protocol
    Yeh, Tzu-Chang
    Wu, Chia-Sheng
    [J]. JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 799 - 804
  • [10] Efficient Ultralightweight RFID Mutual Authentication
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, : 102 - 108