Skip to main content
Log in

An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Radio frequency identification (RFID) technology enables unique identification and tracking of the tag attached to an object. Widespread usage of RFID technologies in supply chain management (SCM) has drawn attention for developing security protocols to protect data stored in the tag. In SCM objects move from one place/department to another, the same RFID readers are not used throughout the supply chain. So, current reader delegates its access right to the new reader. When an object is moved inside the organization, delegation takes place between the readers. Many of the existing delegation protocols use trusted third party (TTP), which is practically difficult to incorporate or requires a keyed hash function/symmetric key encryption to be executed in the RFID tag, whereas tags are computationally intensive. Our work aims to simplify the delegation process by removing the usage of a TTP as well as eliminating reader-to-reader communication which avoids fixing the reader sequence in advance. Also, it preserves the security and privacy requirements for cloud-based applications. The proposed protocol withstands many attacks like tracing attack, tag impersonation attack, reader impersonation attack, and privacy attack. The proposed protocol not only resists the above-mentioned attacks but also achieves mutual authentication, anonymity property, and forward/backward secrecy. The proposed protocol is analyzed formally using GNY logic, which ensures that the protocol achieves mutual authentication. Performance analysis is carried out and it shows that our protocol is relatively better than the existing related schemes with respect to tag computation and communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Avoine G (2017) Security and privacy lounge. http://www.avoine.net/rfid. Accessed 20 Nov 2017

  2. Aghili SF, Ashouri-Talouki M, Mala H (2017) Dos, impersonation and de-synchronization attacks against an ultra-lightweight rfid mutual authentication protocol for iot. J Supercomput 74:1–17

    Google Scholar 

  3. Anandhi S, Anitha R, Sureshkumar V (2016) An rfid cloud authentication protocol for object tracking system in supply chain management. In: Digital connectivity–social impact. Communications in Computer and Information Science (CCIS), vol 679. Springer, Singapore, pp 247–256

  4. Cao T, Chen X, Doss R, Zhai J, Wise LJ, Zhao Q (2016) Rfid ownership transfer protocol based on cloud. Comput Netw 105:47–59

    Article  Google Scholar 

  5. Chen X, Cao T, Guo Y (2014) A new scalable rfid delegation protocol. Appl Math 8(4):1917–1924

    Google Scholar 

  6. Dimitriou T (2016) Key evolving rfid systems: forward/backward privacy and ownership transfer of rfid tags. Ad Hoc Netw 37:195–208

    Article  Google Scholar 

  7. Erguler I, Anarim E (2012) Security flaws in a recent rfid delegation protocol. Pers Ubiquitous Comput 16(3):337–349

    Article  Google Scholar 

  8. Fernndez-Mir A, Trujillo-Rasua R, Castella-Roca J et al (2012) A scalable rfid authentication protocol supporting ownership transfer and controlled delegation. In: International Workshop on Radio Frequency Identification: Security and Privacy Issues. Springer, Heidelberg, pp 147–162

  9. Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: Proceedings, 1990 IEEE computer society symposium on research in security and privacy, 1990, pp 234–248. IEEE

  10. Hugos MH (2018) Essentials of supply chain management. Wiley, New York

    Book  Google Scholar 

  11. Kang J (2016) Lightweight mutual authentication rfid protocol for secure multi-tag simultaneous authentication in ubiquitous environments. J Supercomput. https://doi.org/10.1007/s11227-016-1788-6

  12. Lee C C, Li C T, Cheng CL, Lai Y M, Vasilakos AV (2018) A novel group ownership delegate protocol for rfid systems. Inf Syst Front. https://doi.org/10.1007/s10796-018-9835-x

  13. Luo JN, Yang MH (2014) An efficient offline delegation protocol in mobile rfid environment. J Netw 9(5):1114–1120

    Google Scholar 

  14. Niu H, Taqieddin E, Jagannathan S (2016) Epc gen2v2 rfid standard authentication and ownership management protocol. IEEE Trans Mobile Comput 15(1):137–149

    Article  Google Scholar 

  15. Osborn SL, Wang H (2013) A survey of delegation from an rbac perspective. J Softw 8(2):266–275

    Article  Google Scholar 

  16. Piramuthu S (2012) Vulnerabilities of rfid protocols proposed in isf. Inf Syst Front 14(3):647–651

    Article  Google Scholar 

  17. Plageras AP, Psannis KE, Ishibashi Y, Kim BG (2016) Iot-based surveillance system for ubiquitous healthcare. In: IECON 2016-42nd Annual Conference of the IEEE Industrial Electronics Society, pp 6226–6230. IEEE

  18. Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta B (2017) Efficient iot-based sensor big data collection-processing and analysis in smart buildings. Future Gener Comput Syst 82:349–357

    Article  Google Scholar 

  19. Plageras AP, Stergiou C, Kokkonis G, Psannis KE, Ishibashi Y, Kim BG, Gupta BB (2017) Efficient large-scale medical data (ehealth big data) analytics in internet of things. In: 2017 IEEE 19th Conference on Business informatics (CBI), vol. 2, pp 21–27. IEEE

  20. Rostampour S, Bagheri N, Hosseinzadeh M, Khademzadeh A (2017) A scalable and lightweight grouping proof protocol for internet of things applications. J Supercomput 74:1–16

    Google Scholar 

  21. Song B, Mitchell CJ (2011) Scalable rfid security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566

    Article  Google Scholar 

  22. Stergiou C, Psannis KE (2017) Efficient and secure big data delivery in cloud computing. Multimed Tools Appl 76(21):22803–22822

    Article  Google Scholar 

  23. Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of iot and cloud computing. Future Gener Comput Syst 78:964–975

    Article  Google Scholar 

  24. Sureshkumar V, Amin R, Anitha R (2017) A robust mutual authentication scheme for session initiation protocol with key establishment. Peer Peer Netw Appl 1–17

  25. Tewari A, Gupta B (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using rfid tags. J Supercomput 73(3):1085–1102

    Article  Google Scholar 

  26. Wang KH, Chen CM, Fang W, Wu TY (2017) On the security of a new ultra-lightweight authentication protocol in iot environment for rfid tags. J Supercomput 74:1–6

    Google Scholar 

  27. Wang SJ, Wang WL, Huang CT, Chen SC (2011) Improving inventory effectiveness in rfid-enabled global supply chain with grey forecasting model. J Strateg Inf Syst 20(3):307–322

    Article  Google Scholar 

  28. Yang MH (2010) Controlled delegation protocol in mobile rfid networks. EURASIP J Wirel Commun Netw 2010(1):150–170

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Anandhi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anandhi, S., Anitha, R. & Sureshkumar, V. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment. J Supercomput 74, 3148–3167 (2018). https://doi.org/10.1007/s11227-018-2365-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2365-y

Keywords

Navigation