Efficient P2P-based mutual authentication protocol for RFID system security of EPC network using asymmetric encryption algorithm

Abstract Internet of Things (IoT) is a new vision of the future technological ubiquity in ubiquitous computing, which becomes the mapping from the real world to the digital one. Radio frequency identification (RFID) technology is a key enabler of the future IoT and it has a great economical potential. However, the RFID system uses of Electronic Product Code (EPC) tags can drastically threaten the security of applications. With the widespread use of RFID technology, its security problems become the hot topic in the academic and industrial fields. Aiming at the RFID network's security problems, we propose a novel P2P based RFID network architecture (P2P-RFID), and analyze the security problems in this kind of network. And a feasible and scalable protocol to guarantee P2P-RFID network security is also presented in this paper. The proposed protocol uses P2P storage technology together with the utilizing of asymmetric encryption algorithm (RSA) based authentication. An analysis proves that the presented protocol is secure. Moreover, the protocol authentication does not require a Certificate Authentication (CA) database, which avoids the single-point bottleneck.

[1]  Seif Haridi,et al.  An Overview of Structured P2P Overlay Networks , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.

[2]  Julio César Hernández Castro,et al.  A secure distance-based RFID identification protocol with an off-line back-end database , 2012, Personal and Ubiquitous Computing.

[3]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[4]  Ahmad-Reza Sadeghi,et al.  Trusted Computing - Special Aspects and Challenges , 2008, SOFSEM.

[5]  Aruna Seneviratne,et al.  PROST: a programmable structured peer-to-peer overlay network , 2004 .

[6]  Ruchuan Wang,et al.  A Novel RFID Reader System Framework based on Peer-to-Peer Network , 2011 .

[7]  Ruchuan Wang,et al.  P2PONS: A Distributed Object Naming Service Architecture based on P2P for EPC Network , 2011 .

[8]  Dong Wang,et al.  Use of RFID for Intelligent Pre-shipment Inspection , 2010, J. Digit. Content Technol. its Appl..

[9]  Ingmar Baumgart,et al.  S/Kademlia: A practicable approach towards secure key-based routing , 2007, 2007 International Conference on Parallel and Distributed Systems.

[10]  Mike Burmester,et al.  Universally composable and forward-secure RFID authentication and authenticated key exchange , 2007, ASIACCS '07.

[11]  Ran Canetti,et al.  Obtaining Universally Compoable Security: Towards the Bare Bones of Trust , 2007, ASIACRYPT.

[12]  Yuanbo Guo,et al.  Security Improvement in Authentication Protocol for Gen-2 Based RFID System , 2011 .

[13]  Hung-Min Sun,et al.  Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems , 2008, 2009 Joint Conferences on Pervasive Computing (JCPC).

[14]  Dong Wang,et al.  Impact of RFID Technology on Tracking of Export Goods in Kenya , 2010, J. Convergence Inf. Technol..

[15]  Jian Wang,et al.  New Learning Algorithms for Third-Order 2-D Hidden Markov Models , 2011 .

[16]  Kwangjo Kim,et al.  Defending RFID authentication protocols against DoS attacks , 2011, Comput. Commun..

[17]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[18]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[19]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.