Skip to main content
Log in

A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the internet network. One part of the infrastructure of IoT is Radio Frequency Identification (RFID). One way to fortify the system and prevent it against an unauthorized access is an authentication process. A grouping proof protocol is a protocol by which a reader authenticates two or more tags simultaneously in an authentication process. In this paper, we present a novel scalable grouping proof protocol. Since scalability is a challenge in grouping proof protocol, to solve the scalability problem in the proposed protocol, the reader broadcasts the messages and the tags respond to it independently. In terms of the performance, we use a 64-bit lightweight Pseudo-Random Number Generator (64-PRNG) function, which meets the needs of low-power and low-cost systems. In addition, the security analysis results prove that the proposed protocol is resistant against RFID threats and provides an acceptable security level and low computation cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Tewari A, Gupta B (2016) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085–1102

  2. El Kafhali S, Salah K (2017) Efficient and dynamic scaling of fog nodes for IoT devices. J Supercomput. doi:10.1007/s11227-017-2083-x

  3. Kumari S, Karuppiah M, Das A, Li X, Wu F, Kumar N (2017) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput. doi:10.1007/s11227-017-2048-0

  4. Ning H, Liu H, Yang LT (2015) Aggregated-proof based hierarchical authentication scheme for the Internet of things. IEEE Trans Parallel Distrib Syst 26(3):657–667

    Article  Google Scholar 

  5. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of things: the road ahead. Comput Netw 76:146–164

    Article  Google Scholar 

  6. Tsai C-W, Lai C-F, Vasilakos AV (2014) Future Internet of things: open issues and challenges. Wirel Netw 20(8):2201–2217

  7. Lee B, Lee JH (2017) Blockchain-based secure firmware update for embedded devices in an Internet of things environment. J Supercomput 73:1152

    Article  Google Scholar 

  8. Fan K, Ge N, Gong Y, Li H, Su R, Yang Y (2016) An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw Appl 10(2):368–376

    Article  Google Scholar 

  9. Li C-T, Weng C-Y, Lee C-C (2015) A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. J Med Syst 39(8):1–8

    Article  Google Scholar 

  10. Manjulata AK (2014) Survey on lightweight primitives and protocols for RFID in wireless sensor networks. Int J Commun Netw Inf Secur 6(1):29

    Google Scholar 

  11. Sundaresan S, Doss R, Piramuthu S, Zhou W (2014) A robust grouping proof protocol for rfid epc c1g2 tags. IEEE Trans Inf Forensics Secur 9(6):961–975

    Article  Google Scholar 

  12. Ko W-T, Chiou S-Y, Lu E-H, Chang HK-C (2014) Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety. J Med Syst 38(9):1–12

    Article  Google Scholar 

  13. Juels A (2004) ”yoking-proofs” for RFID tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. IEEE, pp 138–143

  14. Liu H, Ning H, Zhang Y, He D, Xiong Q, Yang LT (2013) Grouping-proofs-based authentication protocol for distributed RFID systems. IEEE Trans Parallel Distrib Syst 24(7):1321–1330

    Article  Google Scholar 

  15. Yu Y-C, Hou T-W, Chiang T-C (2012) Low cost RFID real lightweight binding proof protocol for medication errors and patient safety. J Med Syst 36(2):823–828

    Article  Google Scholar 

  16. Lee H, Hong D (2006) The tag authentication scheme using self-shrinking generator on RFID system. Trans Eng Comput Technol 18:52–57

    Google Scholar 

  17. Yuan B, Liu J (2015) A universally composable secure grouping-proof protocol for rfid tags. Concurr Comput Pract Exp 28:1872

    Article  Google Scholar 

  18. Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I (2006) An elliptic curve processor suitable for RFID-tags. IACR Cryptol ePrint Arch 2006:227

    Google Scholar 

  19. Hsi C-T, Lien Y-H, Chiu J-H, Chang HK-C (2015) Solving scalability problems on secure RFID grouping-proof protocol. Wirel Pers Commun 84(2):1069–1088

    Article  Google Scholar 

  20. Lo N.-W., Yeh K.-H. (2010) A secure communication protocol for EPC-global Class 1 Generation 2 RFID systems. In: 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, pp 562–566

  21. Peris-Lopez P, Orfila A, Mitrokotsa A, Van der Lubbe JC (2011) A comprehensive RFID solution to enhance inpatient medication safety. Int J Med Inf 80(1):13–24

    Article  Google Scholar 

  22. Wang S, Liu S, Chen D (2015) Security analysis and improvement on two RFID authentication protocols. Wirel Pers Commun 82(1):21–33

    Article  Google Scholar 

  23. Melia-Segui J, Garcia-Alfaro J, Herrera-Joancomarti J (2013) J3Gen: a PRNG for low-cost passive RFID. Sensors 13(3):3816–3830

    Article  Google Scholar 

  24. Lo N-W, Yeh K-H et al (2010) Anonymous coexistence proofs for RFID tags. J Inf Sci Eng 26(4):1213–1230

    Google Scholar 

  25. Melia-Segui J, Garcia-Alfaro J, Herrera-Joancomarti J (2010) Analysis and improvement of a pseudorandom number generator for RFID Gen2 tags. In: International Conference on Financial Cryptography and Data Security. Springer, pp 34–46

  26. Huang P, Mu H, Zhang C (2014) A new lightweight RFID grouping proof protocol. In: Advanced Technologies, Embedded and Multimedia for Human-Centric Computing. Springer, pp 869–876

  27. Wu S, Chen K, Zhu Y (2012) A secure lightweight RFID binding proof protocol for medication errors and patient safety. J Med Syst 36(5):2743–2749

    Article  Google Scholar 

  28. Peris-Lopez P, Orfila A, Hernandez-Castro JC, Van der Lubbe JC (2011) Flaws on RFID grouping-proofs. Fuidelines for future sound protocols. J Netw Comput Appl 34(3):833–845

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nasour Bagheri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rostampour, S., Bagheri, N., Hosseinzadeh, M. et al. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications. J Supercomput 74, 71–86 (2018). https://doi.org/10.1007/s11227-017-2106-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-017-2106-7

Keywords

Navigation