Next Article in Journal
Calibration, Conversion, and Quantitative Multi-Layer Inversion of Multi-Coil Rigid-Boom Electromagnetic Induction Data
Previous Article in Journal
A Novel Signal Separation and De-Noising Technique for Doppler Radar Vital Signal Detection
Open AccessArticle

Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography

1
Department of Computer Science, Air University Islamabad, Islamabad 44000, Pakistan
2
Department of Computer Science & Software Engineering, International Islamic University Islamabad, Islamabad 44000, Pakistan
3
Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul 34310, Turkey
4
Department for Management of Science and Technology Development, Ton Duc Thang University, Ho Chi Minh City, Viet Nam
5
Faculty of Information Technology, Ton Duc Thang University, Ho Chi Minh City, Viet Nam
6
Faculty of Health, Queensland University of Technology, Victoria Park Road, Kelvin Grove, QLD 4059, Australia
7
Kando Kalman Faculty of Electrical Engineering, Obuda University, 1034 Budapest, Hungary
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2019, 19(21), 4752; https://doi.org/10.3390/s19214752
Received: 22 July 2019 / Revised: 11 September 2019 / Accepted: 12 September 2019 / Published: 1 November 2019
(This article belongs to the Section Internet of Things)
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security. View Full-Text
Keywords: authentication protocol; IoT Security; RFID security; symmetric cryptography authentication protocol; IoT Security; RFID security; symmetric cryptography
Show Figures

Figure 1

MDPI and ACS Style

Mansoor, K.; Ghani, A.; Chaudhry, S.A.; Shamshirband, S.; Ghayyur, S.A.K.; Mosavi, A. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. Sensors 2019, 19, 4752.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop