Skip to main content
Log in

A Cloud-Based Authentication Protocol for RFID Supply Chain Systems

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

RFID technology is the popular technology in recent years and applies to many automatic identification applications such as supply chain management, thief-prevention and so on. Supply chain system with the help of RFID system reduces the cost in business operation. Different members in the supply chain connect to the same RFID tag for acquiring their own data. Members can protect their secret information not being revealed by internal attacker, and unauthorized member and cloud service provider cannot decrypt the secret information. However, the traditional architecture lacks of data search and scalability. It causes the difficulty in searching a specific object. When one of supply chain member wants to search data of specific tag in database, it will be difficult to locate and search the object. In this paper we proposed a novel cloud-architecture for RFID supply chain system and we also proposed the detail schemes such as authentication, ownership transfer, authority recovery and data sharing. The proposed method comfort to supply chain environment and data sharing phase enhances the efficiency of supply chain. We analyze our method with security and performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391–397 (2011)

    Article  Google Scholar 

  2. Blom, R.: An optimal class of symmetric key generation systems. In: Advances in cryptology, pp. 335–338. Springer (1985)

  3. Diffie, W., Hellman, M.: New directions in cryptography. Inf. Theory IEEE Trans. On 22(6), 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  4. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM (2002)

  5. Du, W., Deng, J., Han, Y. S., Varshney, P. K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 42–51. ACM (2003)

  6. Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2), 228–258 (2005)

    Article  Google Scholar 

  7. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  8. Chen, S.M., Wu, M.E., Sun, H.M., Wang, K.H.: CRFID: an RFID system with a cloud database as a back-end server. Future Gener. Compt. Syst. 30, 155–161 (2014). doi:10.1016/j.future.2013.05.004

    Article  MATH  Google Scholar 

  9. Kardaş, S., Çelik, S., Bingöl, M. A., Levi, A.: A new security and privacy framework for RFID in cloud computing. Paper presented at the 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Bristol, UK

  10. Wei, X., Lei, X., Chen, Z., Quan, Z., Chaojing, T.: Cloud-based RFID authentication. Paper presented at the RFID, 2013 IEEE International Conference on, Penang, 30 April 2013–2 May 2013

  11. Kiraz, M.S., Bingöl, M.A., Kardaş, S., Birinci, F.: Anonymous RFID authentication for cloud services. Int. J. Inf. Secur. Sci. 1(2), 32–42 (2012)

    Google Scholar 

  12. Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Selected Areas in Cryptography, pp. 276–290. Springer (2006)

  13. Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: RFID Security. pp. 147–176. Springer (2009)

  14. Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11), 2314–2341 (2007)

    Article  Google Scholar 

  15. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Security and Privacy. Proceedings. 2003 Symposium on 2003, pp. 197–213. IEEE (2003)

  16. Mohaisen, A., Nyang, D., Maeng, Y., Lee, K., Hong, D.: Grid-based key pre-distribution in wireless sensor networks. KSII Trans. Internet Inf. Syst. 3(2), 195–208 (2009)

    Article  Google Scholar 

  17. Mohaisen, A., Maeng, Y., Nyang, D.: On grid-based key pre-distribution: toward a better connectivity in wireless sensor network. In: Emerging Technologies in Knowledge Discovery and Data Mining. pp. 527–537. Springer (2007)

  18. Tasçi, S.E., Bayramoglu, E., Levi, A.: Simple and flexible random key predistribution schemes for wireless sensor networks using deployment knowledge. In: Information Security and Assurance. ISA 2008. International Conference on 2008, pp. 488–494. IEEE (2008)

  19. Simplício Jr, M.A., Barreto, P.S., Margi, C.B., Carvalho, T.C.: A survey on key management mechanisms for distributed wireless sensor networks. Comput. Netw. 54(15), 2591–2612 (2010)

    Article  Google Scholar 

  20. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 52–61. ACM (2003)

  21. Sadi, M.G., Kim, D.S., Park, J.S.: GBR: Grid based random key predistribution for wireless sensor network. In: Parallel and Distributed Systems. Proceedings. 11th International Conference on 2005, pp. 310–315. IEEE (2005)

  22. Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. J. Netw. Compt. Appl. 33(2), 63–75 (2010)

    Article  MATH  Google Scholar 

  23. Levi, A., Taşçı, S.E., Lee, Y.J., Lee, Y.J., Bayramoğlu, E., Ergun, M.: Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools. J. Intell. Manuf. 21(5), 635–645 (2010)

    Article  Google Scholar 

  24. Huang, D., Mehta, M., van de Liefvoort, A., Medhi, D.: Modeling pairwise key establishment for random key predistribution in large-scale sensor networks. Netw. IEEE ACM Trans. On 15(5), 1204–1215 (2007)

    Article  Google Scholar 

  25. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Advances in cryptology—CRYPTO′92, pp. 471–486. Springer (1993)

  26. Zhang, X., King, B.: Security requirements for RFID computing systems. Int. J. Netw. Secur 6(2), 214–226 (2008)

    Google Scholar 

Download references

Acknowledgments

We are grateful for all the comments of reviewer.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chen-Yang Cheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, IC., Hsu, HH. & Cheng, CY. A Cloud-Based Authentication Protocol for RFID Supply Chain Systems. J Netw Syst Manage 23, 978–997 (2015). https://doi.org/10.1007/s10922-014-9329-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-014-9329-1

Keywords

Navigation