Skip to main content
Log in

AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

A Correction to this article was published on 07 February 2022

This article has been updated

Abstract

With the rapid development in world-wide technologies affecting large-scale applications, the Internet of Things (IoT) has gained a lot of attention from such applications. The Internet of Vehicles (IoV) technology is an exploration of the IoT where radio frequency identification (RFID), one of the promising technologies, can be employed in the IoV systems. However, security and privacy are a key concern in RFID-based IoV system. In the RFID systems during wireless communication among the tag and the reader, an adversary can perform malicious attacks and compromise data privacy. Apart from privacy and security issues, the computation capability and memory of the tags are very limited as compared to the backend server and the reader; therefore, an RFID-based authentication protocol suffers from the high computational overhead. To overcome these issues, we have put forward an anonymous and secure ultralightweight RFID protocol for Internet of Vehicles (AnonSURP). In order to reduce the overhead of the RFID tags, we have exploited the cross and the left rotate operations instead of a hash function for data encryption. In particular, the proposed protocol aims at ensuring the user’s location privacy, data privacy, and resisting typical known attacks. Also, the proposed protocol is ensuring the low-cost of the RFID tags and providing fast certification speed. The informal analysis ensures that the protocol AnonSURP meets the various security requirements and provides resistance from various known attacks. Finally, a comparative analysis has been performed that demonstrates the better performance of the proposed protocol from the existing protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Change history

References

  1. Abughazalah S, Markantonakis K, Mayes K (2014) Secure improved cloud-based rfid authentication protocol. In: Data privacy management, autonomous spontaneous security, and security assurance, pp. 147–164. Springer

  2. Adeli M, Bagheri N (2021) Mdsbsp: a search protocol based on mds codes for rfid-based internet of vehicle. The J Supercomput 77(2):1094–1113

    Article  Google Scholar 

  3. Aghili SF, Mala H, Kaliyar P, Conti M (2019) Seclap: secure and lightweight rfid authentication protocol for medical iot. Fut Gen Comput Syst 101:621–634

    Article  Google Scholar 

  4. Bilal Z, Masood A, Kausar F (2009) Security analysis of ultra-lightweight cryptographic protocol for low-cost rfid tags: Gossamer protocol. In: 2009 International Conference on Network-Based Information Systems, pp. 260–267. IEEE

  5. Chien HY (2007) Sasi: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337–340

    Article  Google Scholar 

  6. Cremers C (2021) Scyther tool, (n.d.). http://www.cs.ox.ac.uk/people/cas.cremers/scyther/. [Online; Accessed on March 10, 2021]

  7. Cremers CJ (2008) The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: International Conference on Computer Aided Verification, pp. 414–418. Springer

  8. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29(2):198–208

    Article  MathSciNet  Google Scholar 

  9. Erguler I, Unsal C, Anarim E, Saldamli G (2012) Security analysis of an ultra-lightweight rfid authentication protocol-slmap*. Secur Commun Netw 5(3):287–291

    Article  Google Scholar 

  10. Fan K, Jiang W, Li H, Yang Y (2018) Lightweight rfid protocol for medical privacy protection in iot. IEEE Trans Ind Inform 14(4):1656–1665

    Article  Google Scholar 

  11. Fan K, Jiang W, Luo Q, Li H, Yang Y (2019) Cloud-based rfid mutual authentication scheme for efficient privacy preserving in iov. J Franklin Inst

  12. Fan K, Kang J, Zhu S, Li H, Yang Y (2019) Permutation matrix encryption based ultralightweight secure rfid scheme in internet of vehicles. Sensors 19(1):152

    Article  Google Scholar 

  13. Fan K, Wang W, Jiang W, Li H, Yang Y (2018) Secure ultra-lightweight rfid mutual authentication protocol based on transparent computing for iov. Peer-to-Peer Netw Appl 11(4):723–734

    Article  Google Scholar 

  14. Jabbar R, Kharbeche M, Al-Khalifa K, Krichen M, Barkaoui K (2020) Blockchain for the internet of vehicles: a decentralized iot solution for vehicles communication using ethereum. Sensors 20(14):3928

    Article  Google Scholar 

  15. Kelsey J, Schneier B, Wagner D, Hall C (1998) Cryptanalytic attacks on pseudorandom number generators. In: International workshop on fast software encryption, pp. 168–188. Springer

  16. Li L, Liu J, Yang Y (2012) Research and development of intelligent motor test system. JCP 7(9):2192–2199

    Google Scholar 

  17. Li T (2005) An immunity based network security risk estimation. Sci China Ser F Inform Sci 48(5):557–578

    Article  MathSciNet  Google Scholar 

  18. Li T, Wang G (2007) Security Analysis of Two Ultra-Lightweight rfid Authentication Protocols. In: IFIP International Information Security Conference, pp. 109–120. Springer

  19. Liu W (2012) Research on Cloud Computing Security Problem and Strategy. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 1216–1219. IEEE

  20. Lu Y, Chen W, Wei X, Zhao F (2013) On the application development of 3g technology in automobiles. In: Proceedings of the FISITA 2012 world automotive congress, pp. 311–325. Springer

  21. Maarof A, Labbi Z, Senhadji M, Belkasmi M (2016) A Novel Mutual Authentication Scheme for Low-Cost rfid Systems. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 240–245

  22. Mei, Y (2014) Research on the privacy preservation for vanet. Huazhong University

  23. Nan CL, Liu SC, Zhou SJ, Zhao XM (2013) Rfid model for the internet of vehicles. Jisuanji Xitong Yingyong Comput Syst Appl 22(4):32–35

    Google Scholar 

  24. Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) Emap: An Efficient Mutual-Authentication Protocol for Low-Cost rfid Tags. In: OTM Confederated International Conferences “On the Move to Meaningful Internet Systems”, pp. 352–361. Springer

  25. Peris-Lopez P, Hernandez-Castro JC, Estévez-Tapiador JM, Ribagorda A (2006) Lmap: a real lightweight mutual authentication protocol for low-cost rfid tags. In: Proc of 2nd Workshop on RFID Security, vol. 6

  26. Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) \(m^2\)ap: A minimalist Mutual-Authentication Protocol for Low-Cost rfid Tags. In: International Conference on Ubiquitous Intelligence and Computing, pp. 912–923. Springer

  27. Peris-Lopez P, Hernandez-Castro JC, Tapiador JM, Ribagorda A (2008) Advances in ultralightweight cryptography for low-cost rfid tags: Gossamer protocol. In: International workshop on information security applications, pp. 56–68. Springer

  28. Phan RCW (2008) Cryptanalysis of a new ultralightweight rfid authentication protocol-sasi. IEEE Trans Depend Secure Comput 6(4):316–320

    Article  Google Scholar 

  29. Rahman M, Sampangi RV, Sampalli S (2015) Lightweight Protocol for Anonymity and Mutual Authentication in Rfid Systems. In: 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 910–915. IEEE

  30. Shariq M, Singh K (2021) A novel vector-space-based lightweight privacy-preserving rfid authentication protocol for iot environment. The J Supercomput pp. 1–31

  31. Shariq M, Singh K (2021) A vector-space-based lightweight rfid authentication protocol. Int J Inform Technol pp. 1–10

  32. Shariq M, Singh K, Bajuri MY, Pantelous A, Ahmadian A, Salimi M (2021) A secure and reliable rfid authentication protocol using schnorr digital cryptosystem for iot-enabled healthcare in covid-19 scenario. Sustainable Cities and Society p. 103354

  33. Shariq M, Singh K, Maurya PK, Ahmadian A, Ariffin MRK (2021) Urasp: an ultralightweight rfid authentication scheme using permutation operation. Peer-to-Peer Netw Appl pp. 1–21

  34. Surekha B, Narayana KL, Jayaprakash P, Vorugunti CS (2016) A Realistic Lightweight Authentication Protocol for Securing Cloud Based rfid System. In: 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 54–60. IEEE

  35. Wei Z, Zhang Y, Yang J (2013) Private assets protection system based on rfid and cloud computing. Proceedings of CECNet’13 pp. 196–198

  36. Wen H, Liang L (2013) Analysis based on vehicle networking application and construction of rfid technology. Electr Test 11:68–69

    Google Scholar 

  37. Xiao H, Alshehri AA, Christianson B (2016) A cloud-based rfid authentication protocol with insecure communication channels. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 332–339. IEEE

  38. Xiao-hong S (2013) Key technology and its application of iov. Commun Technol 4:47–50

    Google Scholar 

  39. Xie W, Xie L, Zhang C, Zhang Q, Tang C (2013) Cloud-Based Rfid Authentication. In: 2013 IEEE International Conference on RFID (RFID), pp. 168–175. IEEE

  40. Yali QXL, Xiangjun Z (2015) Lightweight rfid authentication protocol based on digital signature. Chin J Comput 42(2):95–100

    Google Scholar 

  41. Zheng D, Wang J, Ben K (2013) Research of Information Processing for Massive Sensors in Extended iov Applications. In: 2013 15th IEEE International Conference on Communication Technology, pp. 438–443. IEEE

Download references

Acknowledgements

This work was carried out in Secure and Computing laboratory, SC&SS, JNU, New Delhi, India, and sponsored by the project entitled “Development of Intelligent Device for Security Enhancement (iEYE)” with sanction order: DST/TDT/DDP12/2017-G.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Karan Singh.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shariq, M., Singh, K., Maurya, P.K. et al. AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems. J Supercomput 78, 8577–8602 (2022). https://doi.org/10.1007/s11227-021-04232-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04232-2

Keywords

Navigation