Skip to main content

Self-adaptive RFID Authentication for Internet of Things

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 926))

Abstract

With the development of wireless Internet of Things (IoT) devices, Radio frequency identification (RFID) has been used as a promising technology for the proliferation and communication in IoT networks. However, the RFID techniques are usually plagued with security and privacy issues due to the inherent weaknesses of underlying wireless radio communications. Although several RFID authentication mechanisms have been proposed to address the security concerns in RFID, most of them are still vulnerable to some active attacks, especially the jamming attack. This paper therefore proposes a novel self-adaptive authentication mechanism with a robust key updating, in order to tackle the security vulnerabilities of key updating algorithms and their inability to jamming attacks. Furthermore, we assess the performance and applicability of our solution with a thorough simulation by taking into account the energy consumption and authentication failure rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ge, M., Bangui, H., Buhnova, B.: Big data for internet of things: a survey. Future Gener. Comput. Syst. 87, 601–614 (2018)

    Article  Google Scholar 

  2. Mbarek, B., Meddeb, A., Ben Jaballah, W., Mosbah, M.: A secure electric energy management in smart home. Int. J. Commun. Syst. 30(17) (2017)

    Google Scholar 

  3. Memos, V.A., Psannis, K.E., Ishibashi, Y., Kim, B.-G., Gupta, B.B.: An efficient algorithm for media-based surveillance system (EAMSUS) in IoT smart city framework. Future Gener. Comput. Syst. 83, 619–628 (2018)

    Article  Google Scholar 

  4. Luo, H., Wen, G., Su, J., Huang, Z.: SLAP: succinct and lightweight authentication protocol for low-cost RFID system. Wirel. Netw. 24(1), 69–78 (2018)

    Article  Google Scholar 

  5. Adame, T., Bel, A., Carreras, A., Melià-Seguí, J., Oliver, M., Pous, R.: CUIDATS: an RFID-WSN hybrid monitoring system for smart health care environments. Future Gener. Comput. Syst. 78, 602–615 (2018)

    Article  Google Scholar 

  6. Bangui, H., Ge, M., Buhnova, B.: Exploring big data clustering algorithms for internet of things applications. In: Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security, IoTBDS 2018, Madeira, Portugal, pp. 269–276 (2018)

    Google Scholar 

  7. Stepanek, P., Ge, M.: Validation and extension of the smart city ontology. In: Proceedings of the 20th International Conference on Enterprise Information Systems, ICEIS 2018, Madeira, Portugal, pp. 406–413 (2018)

    Google Scholar 

  8. Naija, Y., Beroulle, V., Machhout, M.: Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tag. J. Electron. Test. 34(3), 291–304 (2018)

    Article  Google Scholar 

  9. Dimitriou, T.: A secure and efficient RFID protocol that could make big brother (partially) obsolete. In: Pervasive Computing and Communications (2006)

    Google Scholar 

  10. Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219 (2004)

    Google Scholar 

  11. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Security in Pervasive Computing, pp. 201–212 (2004)

    Google Scholar 

  12. Lu, L., Han, J., Hu, L., Liu, Y., Ni, L.M.: Dynamic key-updating: privacy-preserving authentication for RFID systems. In: Pervasive Computing and Communications, pp. 13–22 (2007)

    Google Scholar 

  13. Ohkubo, M., Suzuki, K., Kinoshita, S., et al.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop, vol. 82 (2003)

    Google Scholar 

  14. Tewari, A., Gupta, B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using RFID tags. J. Supercomput. 73(3), 1085–1102 (2017)

    Article  Google Scholar 

  15. Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: International Workshop on Selected Areas in Cryptography, pp. 276–290 (2005)

    Google Scholar 

  16. Baashirah, R., Abuzneid, A.: Survey on prominent RFID authentication protocols for passive tags. Sensors 18(10) (2018)

    Google Scholar 

  17. Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y.: Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106, 117–123 (2018)

    Article  Google Scholar 

  18. Liu, B., Su, X.: An anti-collision algorithm for rfid based on an array and encoding scheme. Information 9(3), 63 (2018)

    Article  Google Scholar 

  19. Downard, I.T.: Simulating sensor networks in ns-2. Technical report

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mouzhi Ge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mbarek, B., Ge, M., Pitner, T. (2020). Self-adaptive RFID Authentication for Internet of Things. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_92

Download citation

Publish with us

Policies and ethics