Abstract
Smart logistics play a crucial role for rapid industrialization and economic development of the countries. It not only assists in delivering the low cost services to the subscribers but also helps in bringing transparency in the supply chain management system with the creation of interactive ecosystem encompassing IoT, RFID and sensor-based objects. The realization of the concept of smart logistics includes the real-time communication and object tracking through 5G-oriented Internet of Things (IoT) and Information Communication Technology (ICT)-based smart devices. However, only technological advances are not enough until all intermediaries in the process of supply chain are reliable. Besides, the smart devices exchanging data are deficient in power and require energy friendly communication protocols. This requires the underlying protocols responsible for authenticating the entities in supply chain, to be secure as well as efficient. Recently, a few lightweight authentication protocols for object tracking and logistics including Anandhi et al. (https://doi.org/10.1007/s11277-018-6033-6) have been presented. We ascertain that these schemes lack mutual authenticity and resistance to other forgery attacks. Considering the limitations in Anandhi et al. and other recently presented logistics and supply chain-based authenticated key agreements, we propose a new 5G enabled secure RFID authentication scheme for smart logistics. We analyze and validate the contributed model using formal security analysis based on random oracle model. The proposed scheme supports 19% more security features in comparison with other contemporary schemes. The performance evaluation results demonstrate promising findings for this scheme as compared to other studies.



Similar content being viewed by others
Data Availability
Enquiries about data availability should be directed to the authors.
References
Golpîra, H., Khan, S. A. R., & Safaeipour, S. (2021). A review of logistics internet-of-things: Current trends and scope for future research. Journal of Industrial Information Integration, p. 100194
Li, X., Gong, L., Liu, X., Jiang, F., Shi, W., Fan, L., and Xu, J. (2020). Solving the last mile problem in logistics: A mobile edge computing and blockchain-based unmanned aerial vehicle delivery system. Concurrency and Computation: Practice and Experience, p. e6068
Ding, Y., Jin, M., Li, S., & Feng, D. (2020). Smart logistics based on the internet of things technology: an overview. International Journal of Logistics Research and Applications, pp. 1–23
Li, X., Niu, J., Bhuiyan, M. Z. A., Wu, F., Karuppiah, M., & Kumari, S. (2018). A robust ECC-based provable secure authentication protocol with privacy protection for industrial internet of things. IEEE Transaction of Industrial Information, 14(8), 3599–3609.
Wazid, M., Das, A. K., Odelu, V., Kumar, N., Conti, M., & Jo, M. (2018). Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet of Things Journal, 5(1), 269–282.
X. Li, S. Liu, F. Wu, S. Kumari, and J. J. P. C. Rodrigues (2019) Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J., vol. 6, no. 3
Sidorov, M., Ong, M. T., Sridharan, R. V., Nakamura, J., Ohmura, R., & Khor, J. H. (2019). Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains. IEEE Access, 7, 7273–7285.
Xie, S., Zhang, F., & Cheng, R. (2020). Security Enhanced RFID Authentication Protocols for Healthcare Environment. Wireless Personal Communications, pp. 1–16
Anandhi, S., Anitha, R., & Sureshkumar, V. (2020). An authentication protocol to track an object with multiple RFID tags using cloud computing environment. Wireless Personal Communications, 113(4), 2339–2361.
Fan, K., Ge, N., Gong, Y., Li, H., Su, R., & Yang, Y. (2017). An ultra-lightweight rfid authentication scheme for mobile commerce. Peer-to-Peer Networking and Applications, 10(2), 368–376.
Sergi, I., Montanaro, T., Benvenuto, F. L., & Patrono, L. (2021). A smart and secure logistics system based on IoT and cloud technologies. Sensors, 21(6), 2231.
Zhang, Y., He, D., Li, L., & Chen, B. (2020). A lightweight authentication and key agreement scheme for internet of drones. Computer Communications, 154, 455–464.
Chien, H. Y. (2007). Sasi: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.
Bilal, Z., Masood, A., & Kausar, F. (2009). Security analysis of ultra-lightweight cryptographic protocol for low-cost rfid tags: Gossamer protocol. In International conference on network-based information systems, 2009, NBIS’09 (pp. 260–267). IEEE.
Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for iot and cloud servers. Pervasive and Mobile Computing, 24, 210–223.
Lv, C., Li, H., Ma, J., & Zhang, Y. (2012). Vulnerability analysis of elliptic curve cryptography-based rfid authentication protocols. Transactions on Emerging Telecommunications Technologies, 23(7),
Ye, N., Zhu, Y., Wang, R. C., & Lin, Q. M. (2014). An efficient authentication and access control of things scheme for perception layer of internet. Applied Mathematics and Information Sciences, 8, 1617–1624.
Ray, B., Howdhury, M., Abawajy, J., & Jesmin, M. (2015). Secure object tracking protocol for networked RFID systems. In 2015 16th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD) (pp. 1–7). IEEE.
Ray, B. R., Chowdhury, M. U., & Abawajy, J. H. (2016). Secure object tracking protocol for the internet of things. IEEE Internet of Things Journal, 3(4), 544–553.
Kibria, M. G., Kim, H. S., & Chong, I. (2016). Tracking moving objects for intelligent iot service provisioning in web objects enabled iot environment. In 2016 International conference on information and communication technology convergence (ICTC) (pp. 561–563). IEEE.
Kim, D. H., Park, J. B., Shin, J. H., & Kim, J. D. (2017). Design and implementation of object tracking system based on lora. In 2017 International conference on information networking (ICOIN) (pp. –467). IEEE.
Wu, Y., Lim, J., & Yang, M. H. (2015). Object tracking benchmark. IEEE Transactions on Pattern Analysis and Machine Intelligence, 37(9), 1834–1848.
Yang, K., Forte, D., & Tehranipoor, M. M. (2017). Cdta: A comprehensive solution for counterfeit detection, traceability, and authentication in the iot supply chain. ACM Transactions on Design Automation of Electronic Systems (TODAES), 22(3), 42.
Shamus Software Ltd., Miracl library, http://www.shamus.ie/index.php?page=home
Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16, 702–705. https://doi.org/10.1109/LCOMM.2012.031212.120237
Ahmadiana, Z., Salmasizadehb, M., & Arefa, M. R. (2013). Desynchronization attack on RAPP ultralightweight authentication protocol. Information Processing Letters, 113(7), 205–209. https://doi.org/10.1016/j.ipl.2013.01.003
Zheng, X., Chen, C. M., & Wu, T. Y. (2014). Another improvement of RAPP: An ultra-lightweight authentication protocol for RFID. Intelligent Data Analysis and its Applications, I, 145–153.
Anandhi, S., Anitha, R., & Sureshkumar, V. (2019). Iot enabled RFID authentication and secure object tracking system for smart logistics. Wireless Personal Communications, 104(2), 543–560.
Jin, C., Xu, C., Zhang, X., & Li, F. (2016). A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety. Journal of Medical Systems, 40, 1–6.
Dinarvand, N., & Barati, H. (2019). An efficient and secure RFID authentication protocol using elliptic curve cryptography. Wireless Networks, 25(1), 415–428.
Naeem, M., Chaudhry, S. A., Mahmood, K., Karuppiah, M., & Kumari, S. (2019). A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things. International Journal of Communication System, 33, e3906.
L. Zheng, Y. Xue, L. Zhang, and R. Zhang (2017) Mutual authentication protocol for RFID based on ECC. In Proc. 7 IEEE Int. Conf. Comput. Sci. Eng. (CSE) IEEE Int. Conf. Embedded Ubiquitous Comput. (EUC), pp. 320–323
Alaoui, H. L., El Ghazi, A., Zbakh, M., Touhafi, A., & Braeken, A. (2021). ‘A highly efficient ECC-based authentication protocol for RFID.’ Journal of Sensors, 2021, 1–16.
Shang, S., Li, X., Lu, R., Niu, J., Zhang, X. and Guizani, M., 2022. A Privacy-Preserving Multi-Dimensional Range Query Scheme for Edge-Supported Industrial IoT. IEEE Internet of Things Journal.
Acknowledgement
The Deanship of Scientific Research (DSR) at King Abdulaziz University, Jeddah, Saudi Arabia has funded this project under grant no. (RG-5-611-43).
Funding
This work is not supported for grants from any company or institution
Author information
Authors and Affiliations
Contributions
Both authors contributed to the study conception and design. Abstract, Introduction, Literature work and Proposed methodology, crytanalysis and performance evaluation analysis were performed by Bander Alzahrani and Azeem Irshad . All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
We declare that there are no competing financial interests of authors for this paper. Further, the authors have no relevant financial or non-financial interests to disclose.”
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alzahrani, B.A., Irshad, A. An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics. Wireless Pers Commun 129, 399–422 (2023). https://doi.org/10.1007/s11277-022-10103-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-10103-7