A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT
- PDF / 1,583,482 Bytes
- 14 Pages / 595.224 x 790.955 pts Page_size
- 40 Downloads / 190 Views
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT Mohammad Mamun1 · Atsuko Miyaji2 · Rongxing Luv3 · Chunhua Su4 Received: 28 January 2020 / Accepted: 26 September 2020 © This is a U.S. Government work and not under copyright protection in the US 2020
Abstract The rapid proliferation of Radio Frequency Identification (RFID) tags in the past decade has made tremendous impact on our daily lives. As part of Internet of Things (IoT), RFID technology ensures an efficient, secure and reliable system to identify tagged objects in supply chain environment such as manufacturing, automotive and healthcare. Several lightweight authentication solutions have been proposed to satisfy optimal security and privacy features of RFID communication. Hopper-Blum (HB) family of protocols that rely on the hard problem of Learning Parity with Noise (LPN) is a series of lightweight authentication protocol used to identify RFID tags. Our study shows that recent RFID authentication protocols from HB family that mostly focus on two party authentication such as tag-reader authentication, in general, cannot be applied directly to a three party authentication such as tag-reader-server authentication. In contrast to typical RFID authentication system, we consider the channel between the reader and back-end server insecure. We focus HB protocol and its variants and propose a modified protocol where the entire system is authenticated under LPN-based scheme. Keywords Mutual authentication · HB-family protocol · Pseudo-inverse matrix · Key-evolving signature
1 Introduction As a part of IoT sensors, RFID-based technology is not just a futuristic vision- but rather a technology that is being deployed successfully in applications ranging from aviation system,
Mohammad Mamun
[email protected] Atsuko Miyaji [email protected] Rongxing Lu [email protected] Chunhua Su [email protected] 1
Digital Technology, National Research Council of Canada/Government of Canada, Fredericton, Canada
2
Osaka University, Osaka, Japan
3
Faculty of Computer Science, University of New Brunswick, Fredericton, Canada
4
The University of Aizu, Fukushima, Japan
manufacturing, smart applications to healthcare and safety system [4, 5]. RFID based ecosystem evolves as an example of P2P-based IoT that provides a full communication infrastructure by enabling data to be shared between an end-user client device such as smart phone and an RFID-enabled IoT device [31]. In contrast to classical IoT solutions such as database-driven IoT where all data travels through a centralized server e.g. a cloud database, P2P IoT connection allows sharing data directly between the client device and IoT device. Database server can be used in P2P-based IoT only for initiating secure connection such as authenticating devices. Once the connection is established, the communication is transmitted to the client and IoT devices. P2P based IoT model is therefore comply with the General Data Protection Regulation (GDPR) guideline that includ
Data Loading...