CSI 2016: Digital Connectivity – Social Impact pp 247-256 | Cite as
An RFID Cloud Authentication Protocol for Object Tracking System in Supply Chain Management
Abstract
Radio Frequency Identification (RFID) is a valuable technology for tracking objects in the supply chain. Security and privacy requirements arise with the fast deployment of RFID in supply chain in a heterogeneous environment. Authentication is one of the important security requirements in cloud environment. Even though several RFID cloud authentication protocols are available for supply chain management, they lack to satisfy some security requirements. There is a need for secure, efficient, and scalable protocol for agile supply chain. In this paper, an RFID cloud authentication protocol is proposed and an informal security analysis is carried out. Performance analysis is done with respect to the tag entity. The proposed protocol is scalable and it preserves tag/reader privacy, provides mutual authentication and resistant to many attacks. Comparison with the existing protocol in terms of communication cost shows that our protocol outperforms the other protocols.
Keywords
Mutual authentication RFID Cloud authentication Supply Chain Management Security and privacy issuesReferences
- 1.Amin, R., Islam, S.H., Biswas, G., Khan, M.K.: An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. In: International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–7. IEEE (2015)Google Scholar
- 2.Amin, R., Islam, S.H., Biswas, G., Khan, M.K., Kumar, N.: An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography. J. Med. Syst. 39(11), 1–18 (2015)Google Scholar
- 3.Bi, F., Mu, Y.: Efficient RFID authentication scheme for supply chain applications. In: 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 583–588. IEEE (2010)Google Scholar
- 4.Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L.J., Zhao, Q.: RFID ownership transfer protocol based on cloud. Comput. Netw. 105, 47–59 (2016)CrossRefGoogle Scholar
- 5.Cao, T., Shen, P., Bertino, E.: Cryptanalysis of some RFID authentication protocols. J. Commun. 3(7), 20–27 (2008)CrossRefGoogle Scholar
- 6.Chaudhry, S.A.: A secure biometric based multi-server authentication scheme for social multimedia networks. Multimedia Tools Appl. 75(20), 12705–12725 (2015)CrossRefGoogle Scholar
- 7.Chaudhry, S.A., Mahmood, K., Naqvi, H., Sher, M.: A secure authentication scheme for session initiation protocol based on elliptic curve cryptography. In: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp. 1960–1965. IEEE (2015)Google Scholar
- 8.Chen, S.M., Wu, M.E., Sun, H.M., Wang, K.H.: CRFID: An RFID system with a cloud database as a back-end server. Future Gener. Comput. Syst. 30, 155–161 (2014)CrossRefGoogle Scholar
- 9.Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Depend. Secur. Comput. 4(4), 337–340 (2007)MathSciNetCrossRefGoogle Scholar
- 10.Dong, Q., Tong, J., Chen, Y.: Cloud-based RFID mutual authentication protocol without leaking location privacy to the cloud. Int. J. Distrib. Sens. Netw. 2015, 209 (2015)Google Scholar
- 11.Farash, M.S.: Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. 70(2), 987–1001 (2014)MathSciNetCrossRefGoogle Scholar
- 12.He, D., Kumar, N., Chilamkurti, N., Lee, J.H.: Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10), 1–6 (2014)CrossRefGoogle Scholar
- 13.He, D., Zeadally, S.: An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. 2(1), 72–83 (2015)CrossRefGoogle Scholar
- 14.Lin, I.C., Hsu, H.H., Cheng, C.Y.: A cloud-based authentication protocol for RFID supply chain systems. J. Netw. Syst. Manag. 23(4), 978–997 (2015)CrossRefGoogle Scholar
- 15.Reyes, P.M.: RFID in the Supply Chain. McGraw-Hill Professional, Pennsylvania (2011)Google Scholar
- 16.Sundaresan, S., Doss, R., Zhou, W.: Zero knowledge grouping proof protocol for RFID EPC C1G2 tags. IEEE Trans. Comput. 64(10), 2994–3008 (2015)MathSciNetCrossRefGoogle Scholar
- 17.Sureshkumar, V., Anitha, R., Rajamanickam, N., Amin, R.: A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity. Comput. Electr. Eng. (2016, in press). http://dx.doi.org/10.1016/j.compeleceng.2016.07.014
- 18.Sureshkumar, V., Ramalingam, A., Anandhi, S.: Analysis of accountability property in payment systems using strand space model. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Martínez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 424–437. Springer, Heidelberg (2015). doi: 10.1007/978-3-319-22915-7_39 CrossRefGoogle Scholar
- 19.Viganò, L.: Automated security protocol analysis with the AVISPA tool. Electr. Notes Theoret. Comput. Sci. 155, 61–86 (2006)CrossRefGoogle Scholar
- 20.Xie, W., Xie, L., Zhang, C., Zhang, Q., Tang, C.: Cloud-based RFID authentication. In: 2013 IEEE International Conference on RFID (RFID), pp. 168–175. IEEE (2013)Google Scholar