Self-adaptive RFID Authentication for Internet of Things

With the development of wireless Internet of Things (IoT) devices, Radio frequency identification (RFID) has been used as a promising technology for the proliferation and communication in IoT networks. However, the RFID techniques are usually plagued with security and privacy issues due to the inherent weaknesses of underlying wireless radio communications. Although several RFID authentication mechanisms have been proposed to address the security concerns in RFID, most of them are still vulnerable to some active attacks, especially the jamming attack. This paper therefore proposes a novel self-adaptive authentication mechanism with a robust key updating, in order to tackle the security vulnerabilities of key updating algorithms and their inability to jamming attacks. Furthermore, we assess the performance and applicability of our solution with a thorough simulation by taking into account the energy consumption and authentication failure rate.

[1]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[2]  David A. Wagner,et al.  A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..

[3]  Yunhao Liu,et al.  Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.

[4]  Yutaka Ishibashi,et al.  An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework , 2017, Future Gener. Comput. Syst..

[5]  Baolong Liu,et al.  An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme , 2018, Inf..

[6]  Mohsen Machhout,et al.  Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag , 2018, Journal of Electronic Testing.

[7]  Abdelshakour Abuzneid,et al.  Survey on Prominent RFID Authentication Protocols for Passive Tags , 2018, Sensors.

[8]  Miquel Oliver,et al.  CUIDATS: An RFID-WSN hybrid monitoring system for smart health care environments , 2018, Future Gener. Comput. Syst..

[9]  Ian T. Downard,et al.  Simulating Sensor Networks in NS-2 , 2004 .

[10]  Mouzhi Ge,et al.  Exploring Big Data Clustering Algorithms for Internet of Things Applications , 2018, IoTBDS.

[11]  Mouzhi Ge,et al.  Validation and Extension of the Smart City Ontology , 2018, ICEIS.

[12]  Tassos Dimitriou,et al.  A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[13]  Mouzhi Ge,et al.  Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..

[14]  Aref Meddeb,et al.  A secure electric energy management in smart home , 2017, Int. J. Commun. Syst..

[15]  B. B. Gupta,et al.  Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.

[16]  Jian Su,et al.  SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system , 2018, Wirel. Networks.

[17]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[18]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..