Skip to main content
Log in

An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Aiming at the problem that the fixed radio frequency identification (RFID) system with lightweight cryptography may be easily illegally controlled, a communication authentication protocol based on quantum key distribution using decoy-state method is proposed and developed in this study. A new RFID-system model using quantum key distribution is introduced, which indicates that the quantum keys are distributed to the RFID tags and reader and EPC information server via weakly coherent photons transmitted through optical fiber. This work mainly presents the protocol description with detailed theoretical analyses, including RFID system’s initialization, the transmission, reception, and acquisition of the random quantum key, and the authentication process between the EPC information server and the RFID tag and reader. The security analysis of the protocol is finally carried out, which proves that the proposed protocol can prevent various eavesdropper’s attacks with solid security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Phillips, T., Karygiannis, T., & Kuhn, R. (2005). Security standards for the RFID market. IEEE Security Privacy, 3(6), 85–89.

    Article  Google Scholar 

  2. Zuo, Y. (2010). Survivable RFID systems: Issues, challenges, and techniques. IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews), 40, 406–418.

    Google Scholar 

  3. Vahedi, E., Shah-Mansouri, V., Wong, V. W. S., Blake, I. F., & Ward, R. K. (2011). Probabilistic analysis of blocking attack in RFID systems. IEEE Transactions on Information Forensics and Security, 6, 803–817.

    Article  Google Scholar 

  4. Yang, P., Wu, W., Moniri, M., & Chibelushi, C. C. (2013). Efficient object localization using sparsely distributed passive RFID tags. IEEE Transactions on Industrial Electronics, 60, 5914–5924.

    Article  Google Scholar 

  5. Sato, Y., Mitsugi, J., Nakamura, O., & Murai, J. (2012). Theory and performance evaluation of group coding of RFID tags. IEEE Transactions on Automation Science and Engineering, 9, 458–466.

    Article  Google Scholar 

  6. Zhu, W., Cao, J., Xu, Y., Yang, L., & Kong, J. (2014). Fault–tolerant RFID reader localization based on passive RFID tags. IEEE Transactions on Parallel and Distributed Systems, 25, 2065–2076.

    Article  Google Scholar 

  7. Inamori, H., Lütkenhaus, N., & Mayers, D. (2007). Unconditional security of practical quantum key distribution. European Physical Journal D, 41, 599–627.

    Article  Google Scholar 

  8. Ma, H., Chen, B., Guo, Z., & Li, H. (2008). Development of quantum network based on multiparty quantum secret sharing. Canadian Journal of Physics, 86, 1097–1101.

    Article  Google Scholar 

  9. Gong, L., Liu, Y., & Zhou, N. (2013). Novel quantum virtual private network scheme for PON via quantum secure direct communication. International Journal of Theoretical Physics, 52, 3260–3268.

    Article  MathSciNet  MATH  Google Scholar 

  10. Zhou, N., Cheng, H. L., & Gong, L. H. (2014). Three-party quantum network communication protocols based on quantum teleportation. International Journal of Theoretical Physics, 53, 1387–1403.

    Article  MathSciNet  MATH  Google Scholar 

  11. Gong, L., Song, H. C., Liu, Y., & Zhou, N. (2014). A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Physica Scripta, 89, 035101.

    Article  Google Scholar 

  12. Hwang, W. (2003). Quantum key distribution with high loss: Toward global secure communication. Physical Review Letters, 91, 057901.

    Article  Google Scholar 

  13. Wang, X. (2005). Decoy-state protocol for quantum cryptography with four different intensities of coherent light. Physical Review A, 72, 012322.

    Article  Google Scholar 

  14. Peng, C., Zhang, J., Yang, D., Gao, W. B., Ma, H. X., Yin, H., et al. (2007). Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Physical Review Letters, 98, 010505.

    Article  Google Scholar 

  15. Lim, C., Curty, M., Walenta, N., Xu, F., & Zbinden, H. (2014). Concise security bounds for practical decoy-state quantum key distribution. Physical Review A, 89, 022307.

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by National Natural Science Foundation of China (Grant Nos. 11547035, 61572270).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongyang Ma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, H., Chen, B. An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT. Wireless Pers Commun 91, 1335–1344 (2016). https://doi.org/10.1007/s11277-016-3531-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3531-2

Keywords

Navigation