Reconstructing a lightweight security protocol in the radio‐frequency identification systems

Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. In recent years,...

Full description

Saved in:
Bibliographic Details
Main Authors: Alireza Abdellahi Khorasgani, Mahdi Sajadieh, Mohammad Rouhollah Yazdani
Format: Article
Language:English
Published: Wiley 2023-07-01
Series:IET Computers & Digital Techniques
Subjects:
Online Access:https://doi.org/10.1049/cdt2.12064
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832547385601949696
author Alireza Abdellahi Khorasgani
Mahdi Sajadieh
Mohammad Rouhollah Yazdani
author_facet Alireza Abdellahi Khorasgani
Mahdi Sajadieh
Mohammad Rouhollah Yazdani
author_sort Alireza Abdellahi Khorasgani
collection DOAJ
description Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. In recent years, researchers have proposed a small number of RFID‐based (radio‐frequency identification) security solutions for the IoT. The use of RFID to secure IoT systems is growing rapidly, for it provides small‐scale efficient security mechanisms. Due to the importance of privacy and security in IoT systems, Chuang and Tu have proposed a lightweight authentication protocol using XCor operation. The purpose is to investigate the security of the mentioned protocol and to show the problems of XCor operations used in this protocol. The authors reveal its vulnerability to various attacks, such as tag impersonation, reader impersonation and de−synchronisation attacks. To solve the problems of the Chuang protocol, a secure authentication protocol that uses the lightweight Plr operation is proposed. A formal security analysis of this protocol is performed based on the BAN (Burrows‐Abadi‐Needham) logic. Furthermore, a comparison was drawn between the proposed protocol and the existing similar protocols in terms of performance evaluation. The comparison will reveal that the proposed protocol is both lightweight and highly secure.
format Article
id doaj-art-bc6be7d4cbd646c4b870c300e93aee68
institution Kabale University
issn 1751-8601
1751-861X
language English
publishDate 2023-07-01
publisher Wiley
record_format Article
series IET Computers & Digital Techniques
spelling doaj-art-bc6be7d4cbd646c4b870c300e93aee682025-02-03T06:45:05ZengWileyIET Computers & Digital Techniques1751-86011751-861X2023-07-01173-420922310.1049/cdt2.12064Reconstructing a lightweight security protocol in the radio‐frequency identification systemsAlireza Abdellahi Khorasgani0Mahdi Sajadieh1Mohammad Rouhollah Yazdani2Department of Electrical Engineering Isfahan (Khorasgan) Branch Islamic Azad University Isfahan IranDepartment of Electrical Engineering Isfahan (Khorasgan) Branch Islamic Azad University Isfahan IranDepartment of Electrical Engineering Isfahan (Khorasgan) Branch Islamic Azad University Isfahan IranAbstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. In recent years, researchers have proposed a small number of RFID‐based (radio‐frequency identification) security solutions for the IoT. The use of RFID to secure IoT systems is growing rapidly, for it provides small‐scale efficient security mechanisms. Due to the importance of privacy and security in IoT systems, Chuang and Tu have proposed a lightweight authentication protocol using XCor operation. The purpose is to investigate the security of the mentioned protocol and to show the problems of XCor operations used in this protocol. The authors reveal its vulnerability to various attacks, such as tag impersonation, reader impersonation and de−synchronisation attacks. To solve the problems of the Chuang protocol, a secure authentication protocol that uses the lightweight Plr operation is proposed. A formal security analysis of this protocol is performed based on the BAN (Burrows‐Abadi‐Needham) logic. Furthermore, a comparison was drawn between the proposed protocol and the existing similar protocols in terms of performance evaluation. The comparison will reveal that the proposed protocol is both lightweight and highly secure.https://doi.org/10.1049/cdt2.12064cryptographic protocolsinternet of things
spellingShingle Alireza Abdellahi Khorasgani
Mahdi Sajadieh
Mohammad Rouhollah Yazdani
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
IET Computers & Digital Techniques
cryptographic protocols
internet of things
title Reconstructing a lightweight security protocol in the radio‐frequency identification systems
title_full Reconstructing a lightweight security protocol in the radio‐frequency identification systems
title_fullStr Reconstructing a lightweight security protocol in the radio‐frequency identification systems
title_full_unstemmed Reconstructing a lightweight security protocol in the radio‐frequency identification systems
title_short Reconstructing a lightweight security protocol in the radio‐frequency identification systems
title_sort reconstructing a lightweight security protocol in the radio frequency identification systems
topic cryptographic protocols
internet of things
url https://doi.org/10.1049/cdt2.12064
work_keys_str_mv AT alirezaabdellahikhorasgani reconstructingalightweightsecurityprotocolintheradiofrequencyidentificationsystems
AT mahdisajadieh reconstructingalightweightsecurityprotocolintheradiofrequencyidentificationsystems
AT mohammadrouhollahyazdani reconstructingalightweightsecurityprotocolintheradiofrequencyidentificationsystems