Abstract
The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the internet network. One part of the infrastructure of IoT is Radio Frequency Identification (RFID). One way to fortify the system and prevent it against an unauthorized access is an authentication process. A grouping proof protocol is a protocol by which a reader authenticates two or more tags simultaneously in an authentication process. In this paper, we present a novel scalable grouping proof protocol. Since scalability is a challenge in grouping proof protocol, to solve the scalability problem in the proposed protocol, the reader broadcasts the messages and the tags respond to it independently. In terms of the performance, we use a 64-bit lightweight Pseudo-Random Number Generator (64-PRNG) function, which meets the needs of low-power and low-cost systems. In addition, the security analysis results prove that the proposed protocol is resistant against RFID threats and provides an acceptable security level and low computation cost.
Similar content being viewed by others
References
Tewari A, Gupta B (2016) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085–1102
El Kafhali S, Salah K (2017) Efficient and dynamic scaling of fog nodes for IoT devices. J Supercomput. doi:10.1007/s11227-017-2083-x
Kumari S, Karuppiah M, Das A, Li X, Wu F, Kumar N (2017) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput. doi:10.1007/s11227-017-2048-0
Ning H, Liu H, Yang LT (2015) Aggregated-proof based hierarchical authentication scheme for the Internet of things. IEEE Trans Parallel Distrib Syst 26(3):657–667
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of things: the road ahead. Comput Netw 76:146–164
Tsai C-W, Lai C-F, Vasilakos AV (2014) Future Internet of things: open issues and challenges. Wirel Netw 20(8):2201–2217
Lee B, Lee JH (2017) Blockchain-based secure firmware update for embedded devices in an Internet of things environment. J Supercomput 73:1152
Fan K, Ge N, Gong Y, Li H, Su R, Yang Y (2016) An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw Appl 10(2):368–376
Li C-T, Weng C-Y, Lee C-C (2015) A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. J Med Syst 39(8):1–8
Manjulata AK (2014) Survey on lightweight primitives and protocols for RFID in wireless sensor networks. Int J Commun Netw Inf Secur 6(1):29
Sundaresan S, Doss R, Piramuthu S, Zhou W (2014) A robust grouping proof protocol for rfid epc c1g2 tags. IEEE Trans Inf Forensics Secur 9(6):961–975
Ko W-T, Chiou S-Y, Lu E-H, Chang HK-C (2014) Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety. J Med Syst 38(9):1–12
Juels A (2004) ”yoking-proofs” for RFID tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. IEEE, pp 138–143
Liu H, Ning H, Zhang Y, He D, Xiong Q, Yang LT (2013) Grouping-proofs-based authentication protocol for distributed RFID systems. IEEE Trans Parallel Distrib Syst 24(7):1321–1330
Yu Y-C, Hou T-W, Chiang T-C (2012) Low cost RFID real lightweight binding proof protocol for medication errors and patient safety. J Med Syst 36(2):823–828
Lee H, Hong D (2006) The tag authentication scheme using self-shrinking generator on RFID system. Trans Eng Comput Technol 18:52–57
Yuan B, Liu J (2015) A universally composable secure grouping-proof protocol for rfid tags. Concurr Comput Pract Exp 28:1872
Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I (2006) An elliptic curve processor suitable for RFID-tags. IACR Cryptol ePrint Arch 2006:227
Hsi C-T, Lien Y-H, Chiu J-H, Chang HK-C (2015) Solving scalability problems on secure RFID grouping-proof protocol. Wirel Pers Commun 84(2):1069–1088
Lo N.-W., Yeh K.-H. (2010) A secure communication protocol for EPC-global Class 1 Generation 2 RFID systems. In: 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, pp 562–566
Peris-Lopez P, Orfila A, Mitrokotsa A, Van der Lubbe JC (2011) A comprehensive RFID solution to enhance inpatient medication safety. Int J Med Inf 80(1):13–24
Wang S, Liu S, Chen D (2015) Security analysis and improvement on two RFID authentication protocols. Wirel Pers Commun 82(1):21–33
Melia-Segui J, Garcia-Alfaro J, Herrera-Joancomarti J (2013) J3Gen: a PRNG for low-cost passive RFID. Sensors 13(3):3816–3830
Lo N-W, Yeh K-H et al (2010) Anonymous coexistence proofs for RFID tags. J Inf Sci Eng 26(4):1213–1230
Melia-Segui J, Garcia-Alfaro J, Herrera-Joancomarti J (2010) Analysis and improvement of a pseudorandom number generator for RFID Gen2 tags. In: International Conference on Financial Cryptography and Data Security. Springer, pp 34–46
Huang P, Mu H, Zhang C (2014) A new lightweight RFID grouping proof protocol. In: Advanced Technologies, Embedded and Multimedia for Human-Centric Computing. Springer, pp 869–876
Wu S, Chen K, Zhu Y (2012) A secure lightweight RFID binding proof protocol for medication errors and patient safety. J Med Syst 36(5):2743–2749
Peris-Lopez P, Orfila A, Hernandez-Castro JC, Van der Lubbe JC (2011) Flaws on RFID grouping-proofs. Fuidelines for future sound protocols. J Netw Comput Appl 34(3):833–845
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rostampour, S., Bagheri, N., Hosseinzadeh, M. et al. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications. J Supercomput 74, 71–86 (2018). https://doi.org/10.1007/s11227-017-2106-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-017-2106-7