A Lightweight Inter-Zonal Authentication Protocol for Moving Objects in Low Powered RF Systems

C.K. Shyamala, Anand K Rajagopalan

Abstract


Automatic identification systems represent a wide classification of devices used primarily in commercial settings for inventory/logistics control. Familiar examples of such devices are bar codes, magnetic strips, smart cards, RFID (Radio frequency identification) and biometric and voice recognition. Security is especially lax in low powered RF (radio frequency) systems communicating through an unsecured radio wave channel. Security represents a critical component for enabling the large scale adoption of automatic identification systems. Providing an effective security solution for low powered systems is a major area of concern; it directs research towards ‘power consumption aware’ computations in security solutions. This paper proposes a Lightweight Inter-Zonal Authentication Protocol for moving objects in low powered RF systems. Formal validation and a thorough analysis of the protocol in SPAN security tool reveals its effectiveness and resiliency to attacks – eaves dropping, reader and tag impersonation, replay and desynchronization.

Full Text:

PDF

References


Niu, Haifeng, Eyad Taqieddin, Sarangapani Jagannathan. EPC Gen2v2 RFID standard authentication and ownership management protocol. IEEE Transactions on Mobile Computing. 2016: 15(1): 137-149.

Zhang, Changlun, Wenqi Zhang, Haibing Mu. A mutual authentication security RFID protocol based on time stamp. Computational Intelligence Theory, Systems and Applications (CCITSA), 2015 First International Conference on. IEEE, 2015.

Hermans, Jens, Roel Peeters, Bart Preneel. Proper RFID privacy: model and protocols. IEEE Transactions on Mobile Computing 2014;13(12): 2888-2902.

Dharuman, Lavanya, Senthilkumar Mathi. A Time-invariant Scheme for Handover Key Management Using Identity based Encryption in 4G LTE Networks. Int. J. Contr. Theor. App. 2015; 8(5): 1823-1830.

Mathi, Senthil Kumar, M L Valarmathi. An efficacious and secure registration for internet protocol mobility. Defence Science Journal. 2013; 63(5): 502-507.

Mathi, Senthilkumar, Lavanya Dharuman. Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme. Procedia Computer Science. 2016; 89: 170-179.

Rahman, Musfiq, Raghav V. Sampangi, Srinivas Sampalli. Lightweight protocol for anonymity and mutual authentication in RFID systems. Consumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE. IEEE, 2015.

Pedro Peris-Lopez, et al. Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. International Workshop on Information Security Applications. Springer. 2008.

D'Arco, Paolo, Alfredo De Santis. On ultralightweight RFID authentication protocols. IEEE Transactions on Dependable and Secure Computing. 2011; 8(4): 548-563.

Tian, Yun, Gongliang Chen, Jianhua Li. A new ultralightweight RFID authentication protocol with permutation." IEEE Communications Letters. 2012; 16(5): 702-705.

Ahmed Eslam Gamal, Eman Shaaban, Mohamed Hashem. Lightweight mutual authentication protocol for low cost RFID tags. arXiv preprint arXiv:1005.4499 (2010).

Grimaila Michael. RFID security concerns. ISSA Journal. 2007: 30-35.

Ari Juels. RFID security and privacy: A research survey. IEEE journal on selected areas in communications. 2006; 24(2): 381-394.

Avery Williamson, et al. Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia 2013; 4: 282-287.

Amit Grover, Hal Berghel. A survey of RFID deployment and security issues. Journal of Information Processing Systems. 2011; 7(4): 561-580.

Shih, Dong-Her, Chin-Yi Lin, Binshan Lin. RFID tags: privacy and security aspects. International Journal of Mobile Communications. 2005; 3(3): 214-230.

Burmester, Mike, Breno De Medeiros. RFID security: attacks, countermeasures and challenges. The 5th RFID Academic Convocation, the RFID Journal Conference. 2007.

Osaka, Kyosuke, et al. An efficient and secure RFID security method with ownership transfer. RFID security. Springer US, pp. 147-176, 2008.

Litian, Duan, Duan Fu, Wang John Zizhong. A Mixed and Batching Authentication Protocol for Grouped Tags in Mobile RFID System. Data Science and Data Intensive Systems (DSDIS), 2015 IEEE International Conference on. IEEE, 2015.

Chien, Hung-Yu, Che-Hao Chen. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces. 2007; 29(2): 254-259.

David, Mathieu, Neeli R Prasad. Providing strong security and high privacy in low-cost RFID networks. Security and privacy in mobile information and communication systems, 2009: 172-179.

Jiang, Yi, Wei Cheng, Xiaojiang Du. Group-based key array authentication protocol in radio frequency identification systems. IET Information Security 2014; 8(6): 290-296.

Lu, Li, et al. Dynamic key-updating: Privacy-preserving authentication for RFID systems. Pervasive Computing and Communications, 2007. PerCom'07. Fifth Annual IEEE International Conference on. IEEE. 2007: 13-22.

Kapoor, Gaurav, Selwyn Piramuthu. Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 2012; 42(2): 164-173.

Chen, Hsing-Bai, et al. Enhancement of the RFID security method with ownership transfer. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. ACM, 2009.

Juels, Ari, Stephen A Weis. Authenticating pervasive devices with human protocols. Crypto. 2005; 3621.

Lu, Li, et al. Dynamic key-updating: Privacy-preserving authentication for RFID systems. Pervasive Computing and Communications, 2007. PerCom'07. Fifth Annual IEEE International Conference on. IEEE. 2007: 13-22.

Kaps, Jens-Peter. Chai-Tea, Cryptographic Hardware Implementations of xTEA. INDOCRYPT. 2008.

Wheeler, D, R Needham. TEA extensions (October 1997), Also Correction to XTEA (October 1998). Available via: www. ftp. cl. cam. ac. uk/ftp/users/djw3.

Lamport, Leslie. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM. 1978; 21(7): 558-565.

Gui, Yi-Qi, Jie Zhang, Hwang Kyu Choi. An improved RFID security method with ownership transfer. ICT Convergence (ICTC), 2011 International Conference on. IEEE. 2011: 594-596.




DOI: https://doi.org/10.11591/APTIKOM.J.CSIT.69

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 APTIKOM Journal on Computer Science and Information Technologies



ISSN: 2722-323X, e-ISSN: 2722-3221

CSIT Stats

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.