Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. In recent years,...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2023-07-01
|
Series: | IET Computers & Digital Techniques |
Subjects: | |
Online Access: | https://doi.org/10.1049/cdt2.12064 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832547385601949696 |
---|---|
author | Alireza Abdellahi Khorasgani Mahdi Sajadieh Mohammad Rouhollah Yazdani |
author_facet | Alireza Abdellahi Khorasgani Mahdi Sajadieh Mohammad Rouhollah Yazdani |
author_sort | Alireza Abdellahi Khorasgani |
collection | DOAJ |
description | Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. In recent years, researchers have proposed a small number of RFID‐based (radio‐frequency identification) security solutions for the IoT. The use of RFID to secure IoT systems is growing rapidly, for it provides small‐scale efficient security mechanisms. Due to the importance of privacy and security in IoT systems, Chuang and Tu have proposed a lightweight authentication protocol using XCor operation. The purpose is to investigate the security of the mentioned protocol and to show the problems of XCor operations used in this protocol. The authors reveal its vulnerability to various attacks, such as tag impersonation, reader impersonation and de−synchronisation attacks. To solve the problems of the Chuang protocol, a secure authentication protocol that uses the lightweight Plr operation is proposed. A formal security analysis of this protocol is performed based on the BAN (Burrows‐Abadi‐Needham) logic. Furthermore, a comparison was drawn between the proposed protocol and the existing similar protocols in terms of performance evaluation. The comparison will reveal that the proposed protocol is both lightweight and highly secure. |
format | Article |
id | doaj-art-bc6be7d4cbd646c4b870c300e93aee68 |
institution | Kabale University |
issn | 1751-8601 1751-861X |
language | English |
publishDate | 2023-07-01 |
publisher | Wiley |
record_format | Article |
series | IET Computers & Digital Techniques |
spelling | doaj-art-bc6be7d4cbd646c4b870c300e93aee682025-02-03T06:45:05ZengWileyIET Computers & Digital Techniques1751-86011751-861X2023-07-01173-420922310.1049/cdt2.12064Reconstructing a lightweight security protocol in the radio‐frequency identification systemsAlireza Abdellahi Khorasgani0Mahdi Sajadieh1Mohammad Rouhollah Yazdani2Department of Electrical Engineering Isfahan (Khorasgan) Branch Islamic Azad University Isfahan IranDepartment of Electrical Engineering Isfahan (Khorasgan) Branch Islamic Azad University Isfahan IranDepartment of Electrical Engineering Isfahan (Khorasgan) Branch Islamic Azad University Isfahan IranAbstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. In recent years, researchers have proposed a small number of RFID‐based (radio‐frequency identification) security solutions for the IoT. The use of RFID to secure IoT systems is growing rapidly, for it provides small‐scale efficient security mechanisms. Due to the importance of privacy and security in IoT systems, Chuang and Tu have proposed a lightweight authentication protocol using XCor operation. The purpose is to investigate the security of the mentioned protocol and to show the problems of XCor operations used in this protocol. The authors reveal its vulnerability to various attacks, such as tag impersonation, reader impersonation and de−synchronisation attacks. To solve the problems of the Chuang protocol, a secure authentication protocol that uses the lightweight Plr operation is proposed. A formal security analysis of this protocol is performed based on the BAN (Burrows‐Abadi‐Needham) logic. Furthermore, a comparison was drawn between the proposed protocol and the existing similar protocols in terms of performance evaluation. The comparison will reveal that the proposed protocol is both lightweight and highly secure.https://doi.org/10.1049/cdt2.12064cryptographic protocolsinternet of things |
spellingShingle | Alireza Abdellahi Khorasgani Mahdi Sajadieh Mohammad Rouhollah Yazdani Reconstructing a lightweight security protocol in the radio‐frequency identification systems IET Computers & Digital Techniques cryptographic protocols internet of things |
title | Reconstructing a lightweight security protocol in the radio‐frequency identification systems |
title_full | Reconstructing a lightweight security protocol in the radio‐frequency identification systems |
title_fullStr | Reconstructing a lightweight security protocol in the radio‐frequency identification systems |
title_full_unstemmed | Reconstructing a lightweight security protocol in the radio‐frequency identification systems |
title_short | Reconstructing a lightweight security protocol in the radio‐frequency identification systems |
title_sort | reconstructing a lightweight security protocol in the radio frequency identification systems |
topic | cryptographic protocols internet of things |
url | https://doi.org/10.1049/cdt2.12064 |
work_keys_str_mv | AT alirezaabdellahikhorasgani reconstructingalightweightsecurityprotocolintheradiofrequencyidentificationsystems AT mahdisajadieh reconstructingalightweightsecurityprotocolintheradiofrequencyidentificationsystems AT mohammadrouhollahyazdani reconstructingalightweightsecurityprotocolintheradiofrequencyidentificationsystems |