Abstract
Radio frequency identification (RFID) technology enables unique identification and tracking of the tag attached to an object. Widespread usage of RFID technologies in supply chain management (SCM) has drawn attention for developing security protocols to protect data stored in the tag. In SCM objects move from one place/department to another, the same RFID readers are not used throughout the supply chain. So, current reader delegates its access right to the new reader. When an object is moved inside the organization, delegation takes place between the readers. Many of the existing delegation protocols use trusted third party (TTP), which is practically difficult to incorporate or requires a keyed hash function/symmetric key encryption to be executed in the RFID tag, whereas tags are computationally intensive. Our work aims to simplify the delegation process by removing the usage of a TTP as well as eliminating reader-to-reader communication which avoids fixing the reader sequence in advance. Also, it preserves the security and privacy requirements for cloud-based applications. The proposed protocol withstands many attacks like tracing attack, tag impersonation attack, reader impersonation attack, and privacy attack. The proposed protocol not only resists the above-mentioned attacks but also achieves mutual authentication, anonymity property, and forward/backward secrecy. The proposed protocol is analyzed formally using GNY logic, which ensures that the protocol achieves mutual authentication. Performance analysis is carried out and it shows that our protocol is relatively better than the existing related schemes with respect to tag computation and communication cost.
Similar content being viewed by others
References
Avoine G (2017) Security and privacy lounge. http://www.avoine.net/rfid. Accessed 20 Nov 2017
Aghili SF, Ashouri-Talouki M, Mala H (2017) Dos, impersonation and de-synchronization attacks against an ultra-lightweight rfid mutual authentication protocol for iot. J Supercomput 74:1–17
Anandhi S, Anitha R, Sureshkumar V (2016) An rfid cloud authentication protocol for object tracking system in supply chain management. In: Digital connectivity–social impact. Communications in Computer and Information Science (CCIS), vol 679. Springer, Singapore, pp 247–256
Cao T, Chen X, Doss R, Zhai J, Wise LJ, Zhao Q (2016) Rfid ownership transfer protocol based on cloud. Comput Netw 105:47–59
Chen X, Cao T, Guo Y (2014) A new scalable rfid delegation protocol. Appl Math 8(4):1917–1924
Dimitriou T (2016) Key evolving rfid systems: forward/backward privacy and ownership transfer of rfid tags. Ad Hoc Netw 37:195–208
Erguler I, Anarim E (2012) Security flaws in a recent rfid delegation protocol. Pers Ubiquitous Comput 16(3):337–349
Fernndez-Mir A, Trujillo-Rasua R, Castella-Roca J et al (2012) A scalable rfid authentication protocol supporting ownership transfer and controlled delegation. In: International Workshop on Radio Frequency Identification: Security and Privacy Issues. Springer, Heidelberg, pp 147–162
Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: Proceedings, 1990 IEEE computer society symposium on research in security and privacy, 1990, pp 234–248. IEEE
Hugos MH (2018) Essentials of supply chain management. Wiley, New York
Kang J (2016) Lightweight mutual authentication rfid protocol for secure multi-tag simultaneous authentication in ubiquitous environments. J Supercomput. https://doi.org/10.1007/s11227-016-1788-6
Lee C C, Li C T, Cheng CL, Lai Y M, Vasilakos AV (2018) A novel group ownership delegate protocol for rfid systems. Inf Syst Front. https://doi.org/10.1007/s10796-018-9835-x
Luo JN, Yang MH (2014) An efficient offline delegation protocol in mobile rfid environment. J Netw 9(5):1114–1120
Niu H, Taqieddin E, Jagannathan S (2016) Epc gen2v2 rfid standard authentication and ownership management protocol. IEEE Trans Mobile Comput 15(1):137–149
Osborn SL, Wang H (2013) A survey of delegation from an rbac perspective. J Softw 8(2):266–275
Piramuthu S (2012) Vulnerabilities of rfid protocols proposed in isf. Inf Syst Front 14(3):647–651
Plageras AP, Psannis KE, Ishibashi Y, Kim BG (2016) Iot-based surveillance system for ubiquitous healthcare. In: IECON 2016-42nd Annual Conference of the IEEE Industrial Electronics Society, pp 6226–6230. IEEE
Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta B (2017) Efficient iot-based sensor big data collection-processing and analysis in smart buildings. Future Gener Comput Syst 82:349–357
Plageras AP, Stergiou C, Kokkonis G, Psannis KE, Ishibashi Y, Kim BG, Gupta BB (2017) Efficient large-scale medical data (ehealth big data) analytics in internet of things. In: 2017 IEEE 19th Conference on Business informatics (CBI), vol. 2, pp 21–27. IEEE
Rostampour S, Bagheri N, Hosseinzadeh M, Khademzadeh A (2017) A scalable and lightweight grouping proof protocol for internet of things applications. J Supercomput 74:1–16
Song B, Mitchell CJ (2011) Scalable rfid security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566
Stergiou C, Psannis KE (2017) Efficient and secure big data delivery in cloud computing. Multimed Tools Appl 76(21):22803–22822
Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of iot and cloud computing. Future Gener Comput Syst 78:964–975
Sureshkumar V, Amin R, Anitha R (2017) A robust mutual authentication scheme for session initiation protocol with key establishment. Peer Peer Netw Appl 1–17
Tewari A, Gupta B (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using rfid tags. J Supercomput 73(3):1085–1102
Wang KH, Chen CM, Fang W, Wu TY (2017) On the security of a new ultra-lightweight authentication protocol in iot environment for rfid tags. J Supercomput 74:1–6
Wang SJ, Wang WL, Huang CT, Chen SC (2011) Improving inventory effectiveness in rfid-enabled global supply chain with grey forecasting model. J Strateg Inf Syst 20(3):307–322
Yang MH (2010) Controlled delegation protocol in mobile rfid networks. EURASIP J Wirel Commun Netw 2010(1):150–170
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Anandhi, S., Anitha, R. & Sureshkumar, V. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment. J Supercomput 74, 3148–3167 (2018). https://doi.org/10.1007/s11227-018-2365-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-018-2365-y