Skip to main content
Log in

An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Smart logistics play a crucial role for rapid industrialization and economic development of the countries. It not only assists in delivering the low cost services to the subscribers but also helps in bringing transparency in the supply chain management system with the creation of interactive ecosystem encompassing IoT, RFID and sensor-based objects. The realization of the concept of smart logistics includes the real-time communication and object tracking through 5G-oriented Internet of Things (IoT) and Information Communication Technology (ICT)-based smart devices. However, only technological advances are not enough until all intermediaries in the process of supply chain are reliable. Besides, the smart devices exchanging data are deficient in power and require energy friendly communication protocols. This requires the underlying protocols responsible for authenticating the entities in supply chain, to be secure as well as efficient. Recently, a few lightweight authentication protocols for object tracking and logistics including Anandhi et al. (https://doi.org/10.1007/s11277-018-6033-6) have been presented. We ascertain that these schemes lack mutual authenticity and resistance to other forgery attacks. Considering the limitations in Anandhi et al. and other recently presented logistics and supply chain-based authenticated key agreements, we propose a new 5G enabled secure RFID authentication scheme for smart logistics. We analyze and validate the contributed model using formal security analysis based on random oracle model. The proposed scheme supports 19% more security features in comparison with other contemporary schemes. The performance evaluation results demonstrate promising findings for this scheme as compared to other studies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data Availability

Enquiries about data availability should be directed to the authors.

References

  1. Golpîra, H., Khan, S. A. R., & Safaeipour, S. (2021). A review of logistics internet-of-things: Current trends and scope for future research. Journal of Industrial Information Integration, p. 100194

  2. Li, X., Gong, L., Liu, X., Jiang, F., Shi, W., Fan, L., and Xu, J. (2020). Solving the last mile problem in logistics: A mobile edge computing and blockchain-based unmanned aerial vehicle delivery system. Concurrency and Computation: Practice and Experience, p. e6068

  3. Ding, Y., Jin, M., Li, S., & Feng, D. (2020). Smart logistics based on the internet of things technology: an overview. International Journal of Logistics Research and Applications, pp. 1–23

  4. Li, X., Niu, J., Bhuiyan, M. Z. A., Wu, F., Karuppiah, M., & Kumari, S. (2018). A robust ECC-based provable secure authentication protocol with privacy protection for industrial internet of things. IEEE Transaction of Industrial Information, 14(8), 3599–3609.

    Article  Google Scholar 

  5. Wazid, M., Das, A. K., Odelu, V., Kumar, N., Conti, M., & Jo, M. (2018). Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet of Things Journal, 5(1), 269–282.

    Article  Google Scholar 

  6. X. Li, S. Liu, F. Wu, S. Kumari, and J. J. P. C. Rodrigues (2019) Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J., vol. 6, no. 3

  7. Sidorov, M., Ong, M. T., Sridharan, R. V., Nakamura, J., Ohmura, R., & Khor, J. H. (2019). Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains. IEEE Access, 7, 7273–7285.

    Article  Google Scholar 

  8. Xie, S., Zhang, F., & Cheng, R. (2020). Security Enhanced RFID Authentication Protocols for Healthcare Environment. Wireless Personal Communications, pp. 1–16

  9. Anandhi, S., Anitha, R., & Sureshkumar, V. (2020). An authentication protocol to track an object with multiple RFID tags using cloud computing environment. Wireless Personal Communications, 113(4), 2339–2361.

    Article  Google Scholar 

  10. Fan, K., Ge, N., Gong, Y., Li, H., Su, R., & Yang, Y. (2017). An ultra-lightweight rfid authentication scheme for mobile commerce. Peer-to-Peer Networking and Applications, 10(2), 368–376.

    Article  Google Scholar 

  11. Sergi, I., Montanaro, T., Benvenuto, F. L., & Patrono, L. (2021). A smart and secure logistics system based on IoT and cloud technologies. Sensors, 21(6), 2231.

    Article  Google Scholar 

  12. Zhang, Y., He, D., Li, L., & Chen, B. (2020). A lightweight authentication and key agreement scheme for internet of drones. Computer Communications, 154, 455–464.

    Article  Google Scholar 

  13. Chien, H. Y. (2007). Sasi: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.

    Article  Google Scholar 

  14. Bilal, Z., Masood, A., & Kausar, F. (2009). Security analysis of ultra-lightweight cryptographic protocol for low-cost rfid tags: Gossamer protocol. In International conference on network-based information systems, 2009, NBIS’09 (pp. 260–267). IEEE.

  15. Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for iot and cloud servers. Pervasive and Mobile Computing, 24, 210–223.

    Article  Google Scholar 

  16. Lv, C., Li, H., Ma, J., & Zhang, Y. (2012). Vulnerability analysis of elliptic curve cryptography-based rfid authentication protocols. Transactions on Emerging Telecommunications Technologies, 23(7),

  17. Ye, N., Zhu, Y., Wang, R. C., & Lin, Q. M. (2014). An efficient authentication and access control of things scheme for perception layer of internet. Applied Mathematics and Information Sciences, 8, 1617–1624.

    Article  Google Scholar 

  18. Ray, B., Howdhury, M., Abawajy, J., & Jesmin, M. (2015). Secure object tracking protocol for networked RFID systems. In 2015 16th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD) (pp. 1–7). IEEE.

  19. Ray, B. R., Chowdhury, M. U., & Abawajy, J. H. (2016). Secure object tracking protocol for the internet of things. IEEE Internet of Things Journal, 3(4), 544–553.

    Article  Google Scholar 

  20. Kibria, M. G., Kim, H. S., & Chong, I. (2016). Tracking moving objects for intelligent iot service provisioning in web objects enabled iot environment. In 2016 International conference on information and communication technology convergence (ICTC) (pp. 561–563). IEEE.

  21. Kim, D. H., Park, J. B., Shin, J. H., & Kim, J. D. (2017). Design and implementation of object tracking system based on lora. In 2017 International conference on information networking (ICOIN) (pp. –467). IEEE.

  22. Wu, Y., Lim, J., & Yang, M. H. (2015). Object tracking benchmark. IEEE Transactions on Pattern Analysis and Machine Intelligence, 37(9), 1834–1848.

    Article  Google Scholar 

  23. Yang, K., Forte, D., & Tehranipoor, M. M. (2017). Cdta: A comprehensive solution for counterfeit detection, traceability, and authentication in the iot supply chain. ACM Transactions on Design Automation of Electronic Systems (TODAES), 22(3), 42.

    Article  Google Scholar 

  24. Shamus Software Ltd., Miracl library, http://www.shamus.ie/index.php?page=home

  25. Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16, 702–705. https://doi.org/10.1109/LCOMM.2012.031212.120237

    Article  Google Scholar 

  26. Ahmadiana, Z., Salmasizadehb, M., & Arefa, M. R. (2013). Desynchronization attack on RAPP ultralightweight authentication protocol. Information Processing Letters, 113(7), 205–209. https://doi.org/10.1016/j.ipl.2013.01.003

    Article  MathSciNet  Google Scholar 

  27. Zheng, X., Chen, C. M., & Wu, T. Y. (2014). Another improvement of RAPP: An ultra-lightweight authentication protocol for RFID. Intelligent Data Analysis and its Applications, I, 145–153.

    Google Scholar 

  28. Anandhi, S., Anitha, R., & Sureshkumar, V. (2019). Iot enabled RFID authentication and secure object tracking system for smart logistics. Wireless Personal Communications, 104(2), 543–560.

    Article  Google Scholar 

  29. Jin, C., Xu, C., Zhang, X., & Li, F. (2016). A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety. Journal of Medical Systems, 40, 1–6.

    Article  Google Scholar 

  30. Dinarvand, N., & Barati, H. (2019). An efficient and secure RFID authentication protocol using elliptic curve cryptography. Wireless Networks, 25(1), 415–428.

    Article  Google Scholar 

  31. Naeem, M., Chaudhry, S. A., Mahmood, K., Karuppiah, M., & Kumari, S. (2019). A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things. International Journal of Communication System, 33, e3906.

    Article  Google Scholar 

  32. L. Zheng, Y. Xue, L. Zhang, and R. Zhang (2017) Mutual authentication protocol for RFID based on ECC. In Proc. 7 IEEE Int. Conf. Comput. Sci. Eng. (CSE) IEEE Int. Conf. Embedded Ubiquitous Comput. (EUC), pp. 320–323

  33. Alaoui, H. L., El Ghazi, A., Zbakh, M., Touhafi, A., & Braeken, A. (2021). ‘A highly efficient ECC-based authentication protocol for RFID.’ Journal of Sensors, 2021, 1–16.

    Article  Google Scholar 

  34. Shang, S., Li, X., Lu, R., Niu, J., Zhang, X. and Guizani, M., 2022. A Privacy-Preserving Multi-Dimensional Range Query Scheme for Edge-Supported Industrial IoT. IEEE Internet of Things Journal.

Download references

Acknowledgement

The Deanship of Scientific Research (DSR) at King Abdulaziz University, Jeddah, Saudi Arabia has funded this project under grant no. (RG-5-611-43).

Funding

This work is not supported for grants from any company or institution

Author information

Authors and Affiliations

Authors

Contributions

Both authors contributed to the study conception and design. Abstract, Introduction, Literature work and Proposed methodology, crytanalysis and performance evaluation analysis were performed by Bander Alzahrani and Azeem Irshad . All authors read and approved the final manuscript.

Corresponding author

Correspondence to Bander A. Alzahrani.

Ethics declarations

Conflict of interest

We declare that there are no competing financial interests of authors for this paper. Further, the authors have no relevant financial or non-financial interests to disclose.”

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alzahrani, B.A., Irshad, A. An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics. Wireless Pers Commun 129, 399–422 (2023). https://doi.org/10.1007/s11277-022-10103-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10103-7

Keywords

Navigation