skip to main content
10.1145/2377310.2377335acmotherconferencesArticle/Chapter ViewAbstractPublication PagescfiConference Proceedingsconference-collections
research-article

Privacy protection for low-cost RFID tags in IoT systems

Published: 11 September 2012 Publication History

Abstract

RFID technologies in IoT systems enable to recognize animate or inanimate objects via radio frequency signals. However, RFID has several privacy problems such as object tracking by reading and tracking the ID transmitted from the RFID-tag. To solve such problems, it is required that the RFID-tag should transmit its information to only legitimate readers, i.e., mutual authentication between the RFID-tag and the back-end system is required. This paper proposes a hash-function based mutual authentication protocol for low-cost RFID-tags in which calculation resources are limited. To prevent attackers eavesdropping tag's ID, randomly-picked nicknames shared between the RFID-tag and the back-end system are transmitted in the air. Simulation results show that our protocol consumes less time than a famous mutual authentication protocol, the Gossamer protocol. Security and performance analyses show that our protocol is superior to existing protocols. Thus, this paper demonstrates great potentials in the application into low-cost RFID in IoT systems.

References

[1]
Ivan Gudymenko and Michael Hutter. Security in the Internet of Things. In Proceedings of Intensive Program on Information Communication Security (IPICS 2011), pages 22--31, August 2011.
[2]
Sanjay E. Sarma, Stephen A. Weis, and Daniel W. Engels. RFID Systems and Security and Privacy Implications. In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), pages 454--470, August 2002.
[3]
S. Weis, S. Sarma, R. Rivest, and D. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification systems. In Proceedings of International Conference on Security in Pervasive Computing, pages 201--212, Mar. 2004.
[4]
Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. E. Tapiador, and Arturo Ribagorda. Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol. In Proceedings of Workshop on Information Security Application, volume 5379, pages 56--68, September 2008.
[5]
Jung-Sik Cho, Sand-Soo Yeo, and Sung Kwon Kim. Securing against Brute-Force Attack: A Hash-Based RFID Mutual Authentication Protocol Using a Secret Value. Computer communications, 34:391--397, March 2011.
[6]
National Institute of Standards and Technology. FIPS 180--2: Secure Hash Standard, August 2002. http://akari-project.nict.go.jp/.
[7]
Andrey Bogdanov, Gregor Leander, Christof Paar, and Axel Poschmann. Hash Functions and RFID Tags: Mind the Gap. In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008), pages 283--299, August 2008.
[8]
Li Huixian, Yin Ping, and Wang Xuan. A Novel Hash-Based RFID Mutual Authentication Protocol. In Proceedings of 7th International Conference on Computational Intelligence and Security (CIS 2011), pages 774--778, December 2011.
[9]
N. Rama and R. Suganya. SSL-MAP: A More Secure Gossamer-Based Mutual Authentication Protocol for Passive RFID Tags. International Journal on Computer Science and Engineering, 02:363--367, December 2010.
[10]
Zeeshan Bilal, Ashraf Masood, and Firdous Kausar. Security Analysis of Ultralightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol. In Proceedings of 2009 International Conference on Network-Based Information Systems (NBIS'09), pages 260--267, August 2009.
[11]
EPCglobal Web site, 2012. http://www.EPCglobalinc.org.

Cited By

View all
  • (2019)A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG AlgorithmProceedings of the 2nd International Conference on Computing and Big Data10.1145/3366650.3366664(73-80)Online publication date: 18-Oct-2019
  • (2018)Securing the Internet of Things in the Age of Machine Learning and Software-Defined NetworkingIEEE Internet of Things Journal10.1109/JIOT.2018.28460405:6(4829-4842)Online publication date: Dec-2018
  • (2018)Exploring the RFID mutual authentication domainInternational Journal of Computers and Applications10.1080/1206212X.2018.153361443:2(127-141)Online publication date: 23-Oct-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CFI '12: Proceedings of the 7th International Conference on Future Internet Technologies
September 2012
78 pages
ISBN:9781450316903
DOI:10.1145/2377310
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • FIF: Future Internet Forum

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 September 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. low-cost RFID
  2. mutual authentication
  3. privacy protection

Qualifiers

  • Research-article

Conference

CFI '12
Sponsor:
  • FIF

Acceptance Rates

Overall Acceptance Rate 29 of 55 submissions, 53%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG AlgorithmProceedings of the 2nd International Conference on Computing and Big Data10.1145/3366650.3366664(73-80)Online publication date: 18-Oct-2019
  • (2018)Securing the Internet of Things in the Age of Machine Learning and Software-Defined NetworkingIEEE Internet of Things Journal10.1109/JIOT.2018.28460405:6(4829-4842)Online publication date: Dec-2018
  • (2018)Exploring the RFID mutual authentication domainInternational Journal of Computers and Applications10.1080/1206212X.2018.153361443:2(127-141)Online publication date: 23-Oct-2018
  • (2017)Security and privacy on internet of things2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)10.1109/ICEIEC.2017.8076530(140-144)Online publication date: Jul-2017
  • (2016)lwAKE: A Lightweight Authenticated Key Exchange for Class 0 DevicesInternational Journal of Distributed Sensor Networks10.1155/2016/623649412:5(6236494)Online publication date: 30-May-2016
  • (2015)Secure E-ticketing System based on Mutual Authentication using RFIDProceedings of the Third International Symposium on Women in Computing and Informatics10.1145/2791405.2791573(673-677)Online publication date: 10-Aug-2015
  • (2015)Towards NFC payments using a lightweight architecture for the Web of ThingsComputing10.1007/s00607-014-0397-697:10(985-999)Online publication date: 1-Oct-2015
  • (2015)Data Privacy Issues with RFID in HealthcareMedical Data Privacy Handbook10.1007/978-3-319-23633-9_21(549-567)Online publication date: 2015
  • (2013)A Lightweight Architecture for the Web-of-ThingsProceedings of the 10th International Conference on Mobile Web Information Systems - Volume 809310.1007/978-3-642-40276-0_19(248-259)Online publication date: 26-Aug-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media