Abstract
RFID technology is the popular technology in recent years and applies to many automatic identification applications such as supply chain management, thief-prevention and so on. Supply chain system with the help of RFID system reduces the cost in business operation. Different members in the supply chain connect to the same RFID tag for acquiring their own data. Members can protect their secret information not being revealed by internal attacker, and unauthorized member and cloud service provider cannot decrypt the secret information. However, the traditional architecture lacks of data search and scalability. It causes the difficulty in searching a specific object. When one of supply chain member wants to search data of specific tag in database, it will be difficult to locate and search the object. In this paper we proposed a novel cloud-architecture for RFID supply chain system and we also proposed the detail schemes such as authentication, ownership transfer, authority recovery and data sharing. The proposed method comfort to supply chain environment and data sharing phase enhances the efficiency of supply chain. We analyze our method with security and performance.
Similar content being viewed by others
References
Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391–397 (2011)
Blom, R.: An optimal class of symmetric key generation systems. In: Advances in cryptology, pp. 335–338. Springer (1985)
Diffie, W., Hellman, M.: New directions in cryptography. Inf. Theory IEEE Trans. On 22(6), 644–654 (1976)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM (2002)
Du, W., Deng, J., Han, Y. S., Varshney, P. K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 42–51. ACM (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2), 228–258 (2005)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)
Chen, S.M., Wu, M.E., Sun, H.M., Wang, K.H.: CRFID: an RFID system with a cloud database as a back-end server. Future Gener. Compt. Syst. 30, 155–161 (2014). doi:10.1016/j.future.2013.05.004
Kardaş, S., Çelik, S., Bingöl, M. A., Levi, A.: A new security and privacy framework for RFID in cloud computing. Paper presented at the 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Bristol, UK
Wei, X., Lei, X., Chen, Z., Quan, Z., Chaojing, T.: Cloud-based RFID authentication. Paper presented at the RFID, 2013 IEEE International Conference on, Penang, 30 April 2013–2 May 2013
Kiraz, M.S., Bingöl, M.A., Kardaş, S., Birinci, F.: Anonymous RFID authentication for cloud services. Int. J. Inf. Secur. Sci. 1(2), 32–42 (2012)
Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Selected Areas in Cryptography, pp. 276–290. Springer (2006)
Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: RFID Security. pp. 147–176. Springer (2009)
Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11), 2314–2341 (2007)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Security and Privacy. Proceedings. 2003 Symposium on 2003, pp. 197–213. IEEE (2003)
Mohaisen, A., Nyang, D., Maeng, Y., Lee, K., Hong, D.: Grid-based key pre-distribution in wireless sensor networks. KSII Trans. Internet Inf. Syst. 3(2), 195–208 (2009)
Mohaisen, A., Maeng, Y., Nyang, D.: On grid-based key pre-distribution: toward a better connectivity in wireless sensor network. In: Emerging Technologies in Knowledge Discovery and Data Mining. pp. 527–537. Springer (2007)
Tasçi, S.E., Bayramoglu, E., Levi, A.: Simple and flexible random key predistribution schemes for wireless sensor networks using deployment knowledge. In: Information Security and Assurance. ISA 2008. International Conference on 2008, pp. 488–494. IEEE (2008)
Simplício Jr, M.A., Barreto, P.S., Margi, C.B., Carvalho, T.C.: A survey on key management mechanisms for distributed wireless sensor networks. Comput. Netw. 54(15), 2591–2612 (2010)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 52–61. ACM (2003)
Sadi, M.G., Kim, D.S., Park, J.S.: GBR: Grid based random key predistribution for wireless sensor network. In: Parallel and Distributed Systems. Proceedings. 11th International Conference on 2005, pp. 310–315. IEEE (2005)
Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. J. Netw. Compt. Appl. 33(2), 63–75 (2010)
Levi, A., Taşçı, S.E., Lee, Y.J., Lee, Y.J., Bayramoğlu, E., Ergun, M.: Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools. J. Intell. Manuf. 21(5), 635–645 (2010)
Huang, D., Mehta, M., van de Liefvoort, A., Medhi, D.: Modeling pairwise key establishment for random key predistribution in large-scale sensor networks. Netw. IEEE ACM Trans. On 15(5), 1204–1215 (2007)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Advances in cryptology—CRYPTO′92, pp. 471–486. Springer (1993)
Zhang, X., King, B.: Security requirements for RFID computing systems. Int. J. Netw. Secur 6(2), 214–226 (2008)
Acknowledgments
We are grateful for all the comments of reviewer.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lin, IC., Hsu, HH. & Cheng, CY. A Cloud-Based Authentication Protocol for RFID Supply Chain Systems. J Netw Syst Manage 23, 978–997 (2015). https://doi.org/10.1007/s10922-014-9329-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10922-014-9329-1