An RFID Cloud Authentication Protocol for Object Tracking System in Supply Chain Management

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 679)

Abstract

Radio Frequency Identification (RFID) is a valuable technology for tracking objects in the supply chain. Security and privacy requirements arise with the fast deployment of RFID in supply chain in a heterogeneous environment. Authentication is one of the important security requirements in cloud environment. Even though several RFID cloud authentication protocols are available for supply chain management, they lack to satisfy some security requirements. There is a need for secure, efficient, and scalable protocol for agile supply chain. In this paper, an RFID cloud authentication protocol is proposed and an informal security analysis is carried out. Performance analysis is done with respect to the tag entity. The proposed protocol is scalable and it preserves tag/reader privacy, provides mutual authentication and resistant to many attacks. Comparison with the existing protocol in terms of communication cost shows that our protocol outperforms the other protocols.

Keywords

Mutual authentication RFID Cloud authentication Supply Chain Management Security and privacy issues 

References

  1. 1.
    Amin, R., Islam, S.H., Biswas, G., Khan, M.K.: An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. In: International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–7. IEEE (2015)Google Scholar
  2. 2.
    Amin, R., Islam, S.H., Biswas, G., Khan, M.K., Kumar, N.: An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography. J. Med. Syst. 39(11), 1–18 (2015)Google Scholar
  3. 3.
    Bi, F., Mu, Y.: Efficient RFID authentication scheme for supply chain applications. In: 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 583–588. IEEE (2010)Google Scholar
  4. 4.
    Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L.J., Zhao, Q.: RFID ownership transfer protocol based on cloud. Comput. Netw. 105, 47–59 (2016)CrossRefGoogle Scholar
  5. 5.
    Cao, T., Shen, P., Bertino, E.: Cryptanalysis of some RFID authentication protocols. J. Commun. 3(7), 20–27 (2008)CrossRefGoogle Scholar
  6. 6.
    Chaudhry, S.A.: A secure biometric based multi-server authentication scheme for social multimedia networks. Multimedia Tools Appl. 75(20), 12705–12725 (2015)CrossRefGoogle Scholar
  7. 7.
    Chaudhry, S.A., Mahmood, K., Naqvi, H., Sher, M.: A secure authentication scheme for session initiation protocol based on elliptic curve cryptography. In: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp. 1960–1965. IEEE (2015)Google Scholar
  8. 8.
    Chen, S.M., Wu, M.E., Sun, H.M., Wang, K.H.: CRFID: An RFID system with a cloud database as a back-end server. Future Gener. Comput. Syst. 30, 155–161 (2014)CrossRefGoogle Scholar
  9. 9.
    Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Depend. Secur. Comput. 4(4), 337–340 (2007)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Dong, Q., Tong, J., Chen, Y.: Cloud-based RFID mutual authentication protocol without leaking location privacy to the cloud. Int. J. Distrib. Sens. Netw. 2015, 209 (2015)Google Scholar
  11. 11.
    Farash, M.S.: Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. 70(2), 987–1001 (2014)MathSciNetCrossRefGoogle Scholar
  12. 12.
    He, D., Kumar, N., Chilamkurti, N., Lee, J.H.: Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10), 1–6 (2014)CrossRefGoogle Scholar
  13. 13.
    He, D., Zeadally, S.: An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. 2(1), 72–83 (2015)CrossRefGoogle Scholar
  14. 14.
    Lin, I.C., Hsu, H.H., Cheng, C.Y.: A cloud-based authentication protocol for RFID supply chain systems. J. Netw. Syst. Manag. 23(4), 978–997 (2015)CrossRefGoogle Scholar
  15. 15.
    Reyes, P.M.: RFID in the Supply Chain. McGraw-Hill Professional, Pennsylvania (2011)Google Scholar
  16. 16.
    Sundaresan, S., Doss, R., Zhou, W.: Zero knowledge grouping proof protocol for RFID EPC C1G2 tags. IEEE Trans. Comput. 64(10), 2994–3008 (2015)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Sureshkumar, V., Anitha, R., Rajamanickam, N., Amin, R.: A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity. Comput. Electr. Eng. (2016, in press). http://dx.doi.org/10.1016/j.compeleceng.2016.07.014
  18. 18.
    Sureshkumar, V., Ramalingam, A., Anandhi, S.: Analysis of accountability property in payment systems using strand space model. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Martínez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 424–437. Springer, Heidelberg (2015). doi: 10.1007/978-3-319-22915-7_39 CrossRefGoogle Scholar
  19. 19.
    Viganò, L.: Automated security protocol analysis with the AVISPA tool. Electr. Notes Theoret. Comput. Sci. 155, 61–86 (2006)CrossRefGoogle Scholar
  20. 20.
    Xie, W., Xie, L., Zhang, C., Zhang, Q., Tang, C.: Cloud-based RFID authentication. In: 2013 IEEE International Conference on RFID (RFID), pp. 168–175. IEEE (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2016

Authors and Affiliations

  • S. Anandhi
    • 1
  • R. Anitha
    • 1
  • Venkatasamy Sureshkumar
    • 1
  1. 1.Department of Applied Mathematics and Computational SciencesPSG College of TechnologyCoimbatoreIndia

Personalised recommendations