Security of lightweight mutual authentication protocols

  • PDF / 1,390,423 Bytes
  • 17 Pages / 439.37 x 666.142 pts Page_size
  • 79 Downloads / 252 Views

DOWNLOAD

REPORT


Security of lightweight mutual authentication protocols Yu‑Ju Tu1 · Gaurav Kapoor2 · Selwyn Piramuthu3  Accepted: 7 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Sensors and IoT (Internet of Things), which include RFID (Radio-Frequency IDentification) tags, have witnessed widespread adoption across a wide variety of application domains over the last two decades. These sensors and IoT devices are often a part of distributed sensor networks. As with any distributed processing scenario, there is a need to ensure that these devices provide required security and privacy to the tagged object as well as its bearer. Cryptography has been used to address the security and privacy aspects of RFID tags. Unlike a majority of other IoT devices, the commonly used passive RFID tags are extremely resource-constrained and therefore can accommodate only lightweight operations. Security and privacy concerns still need to be addressed as they remain significant regardless of implementation details. We evaluate RFID-based lightweight mutual authentication protocols that have been recently proposed and identify vulnerabilities. Keywords  RFID · IoT · Mutual authentication · Lightweight

1 Introduction As connectivity of devices become prevalent, there is a concomitant increase in the need for distributed processing among these devices. For example, wireless sensor networks (WSN) [3] comprise several nodes that are spatially distributed across a wide area. Cooperation among these nodes as a part of a system is generally accomplished through distributed processing, which is critical to ensure seamless operation. Specifically, operations such as load balancing and authentication are processed across the network in a distributed manner. With interdependence among nodes in such networks, maintaining security and privacy [18] are of paramount

* Selwyn Piramuthu [email protected] 1

Management Information Systems, National Chengchi University, Taipei, Taiwan

2

Infocomm Technology, Singapore Institute of Technology, Singapore, Singapore

3

Information Systems and Operations Management, University of Florida, Gainesville, USA



13

Vol.:(0123456789)



Y.-J. Tu et al.

importance since a weak link has the potential to expose the rest of the network to vulnerabilities. This is especially crucial in peer-to-peer networks [4] that operate without a trusted third party. Some applications that involve distributed sensor network setup include reefer container monitoring system [6] where these containers are continually monitored, key distribution and allocation in vehicular ad hoc networks (VANET) [10], detection of suspicious activity through IoT in assisted living facilities [15], and the maintenance of energy balance among distributed nodes in a WSN to ensure that there are no nodes with uneven energy consumption that results in the largest energy consuming node to incur a shorter lifespan thereby causing malfunction in the WSN [17]. While barebones distributed processing is by itself a difficult pro