A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources

Author(s):  
Mouza Ahmed Bani Shemaili ◽  
Chan Yeob Yeun ◽  
Mohamed Jamal Zemerly ◽  
Khalid Mubarak ◽  
Hyun Ku Yeun ◽  
...  
2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
Qingkuan Dong ◽  
Jiaqing Tong ◽  
Yuan Chen

With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems. In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. Therefore, the users have to encrypt their data stored in the cloud database to prevent the leakage of privacy. In addition, the reader’s location privacy should be protected to avoid its leak to the cloud provider. In this paper, a cloud-based RFID mutual authentication protocol without leaking location privacy to the cloud is proposed. It provides real-time mutual authentication between the reader and the tag and protects the reader’s location privacy by introducing the location privacy cloud. Compared with traditional backend-server-based schemes and serverless schemes, the proposed scheme has obvious advantages in deployment cost, scalability, real-time authentication, and the tag’s computational complexity.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Umut C. Cabuk ◽  
Gokhan Dalkilic ◽  
Orhan Dagdeviren

2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


2016 ◽  
Vol 6 (8) ◽  
pp. 215 ◽  
Author(s):  
Bing-Chang Chen ◽  
Cheng-Ta Yang ◽  
Her-Tyan Yeh ◽  
Ching-Chao Lin

Sign in / Sign up

Export Citation Format

Share Document