Abstract
Aiming at the problem that the fixed radio frequency identification (RFID) system with lightweight cryptography may be easily illegally controlled, a communication authentication protocol based on quantum key distribution using decoy-state method is proposed and developed in this study. A new RFID-system model using quantum key distribution is introduced, which indicates that the quantum keys are distributed to the RFID tags and reader and EPC information server via weakly coherent photons transmitted through optical fiber. This work mainly presents the protocol description with detailed theoretical analyses, including RFID system’s initialization, the transmission, reception, and acquisition of the random quantum key, and the authentication process between the EPC information server and the RFID tag and reader. The security analysis of the protocol is finally carried out, which proves that the proposed protocol can prevent various eavesdropper’s attacks with solid security.
Similar content being viewed by others
References
Phillips, T., Karygiannis, T., & Kuhn, R. (2005). Security standards for the RFID market. IEEE Security Privacy, 3(6), 85–89.
Zuo, Y. (2010). Survivable RFID systems: Issues, challenges, and techniques. IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews), 40, 406–418.
Vahedi, E., Shah-Mansouri, V., Wong, V. W. S., Blake, I. F., & Ward, R. K. (2011). Probabilistic analysis of blocking attack in RFID systems. IEEE Transactions on Information Forensics and Security, 6, 803–817.
Yang, P., Wu, W., Moniri, M., & Chibelushi, C. C. (2013). Efficient object localization using sparsely distributed passive RFID tags. IEEE Transactions on Industrial Electronics, 60, 5914–5924.
Sato, Y., Mitsugi, J., Nakamura, O., & Murai, J. (2012). Theory and performance evaluation of group coding of RFID tags. IEEE Transactions on Automation Science and Engineering, 9, 458–466.
Zhu, W., Cao, J., Xu, Y., Yang, L., & Kong, J. (2014). Fault–tolerant RFID reader localization based on passive RFID tags. IEEE Transactions on Parallel and Distributed Systems, 25, 2065–2076.
Inamori, H., Lütkenhaus, N., & Mayers, D. (2007). Unconditional security of practical quantum key distribution. European Physical Journal D, 41, 599–627.
Ma, H., Chen, B., Guo, Z., & Li, H. (2008). Development of quantum network based on multiparty quantum secret sharing. Canadian Journal of Physics, 86, 1097–1101.
Gong, L., Liu, Y., & Zhou, N. (2013). Novel quantum virtual private network scheme for PON via quantum secure direct communication. International Journal of Theoretical Physics, 52, 3260–3268.
Zhou, N., Cheng, H. L., & Gong, L. H. (2014). Three-party quantum network communication protocols based on quantum teleportation. International Journal of Theoretical Physics, 53, 1387–1403.
Gong, L., Song, H. C., Liu, Y., & Zhou, N. (2014). A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Physica Scripta, 89, 035101.
Hwang, W. (2003). Quantum key distribution with high loss: Toward global secure communication. Physical Review Letters, 91, 057901.
Wang, X. (2005). Decoy-state protocol for quantum cryptography with four different intensities of coherent light. Physical Review A, 72, 012322.
Peng, C., Zhang, J., Yang, D., Gao, W. B., Ma, H. X., Yin, H., et al. (2007). Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Physical Review Letters, 98, 010505.
Lim, C., Curty, M., Walenta, N., Xu, F., & Zbinden, H. (2014). Concise security bounds for practical decoy-state quantum key distribution. Physical Review A, 89, 022307.
Acknowledgments
This research was supported by National Natural Science Foundation of China (Grant Nos. 11547035, 61572270).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ma, H., Chen, B. An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT. Wireless Pers Commun 91, 1335–1344 (2016). https://doi.org/10.1007/s11277-016-3531-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3531-2