Lightweight NFC Protocol for Privacy Protection in Mobile IoT
Abstract
:1. Introduction
- Our protocol needs less computational overhead and memory storage. Only the XOR and Modulo-Plus function are included in our protocol without hash or other encryption operations. The most complicated operation in our system is the random number generation.
- Our protocol can resist typical attacks in the IoT environment such as denial of service (DoS) attacks, de-synchronization attacks, replay attacks, and identity leakages. The protocol also achieves tag anonymity and the mutual authentication of the IoT system.
2. Relative Works
2.1. The Requirements of Mobile IoT
2.1.1. Security Requirements
- Tag Anonymity: A tag’s identity should be protected during the transmission on the channel.
- Prevent Replay Attacks: Even if attackers can get legitimate messages sent from the tag to the reader, the data cannot be sent repeatedly to trick the authentication server.
- Mutual Authentication: Each party in the system is able to confirm that the other parties are legitimated.
- User privacy: Even if an attacker can get legitimate information sent from the tag to the reader, the tag’s identity and other private information remain confidential.
- Prevent Man in the Middle Attack: Even if attackers can sniff the data transportation in the communication channel, they cannot get any useful information after analysis.
2.1.2. Lightweight Requirements
2.2. System Model
3. Lightweight NFC Protocol for Privacy Protection in Mobile IoT
3.1. Key Management System Model
3.2. Notations
3.3. Registration
3.3.1. NFC Tag Registration
- The IoT devices with NFC chips initiate registration requests to the server through a reader.
- After the server receives the message and records the information of the NFC tag, it generates the device key and the group key .
- The NFC chip downloads a pair of keys and sends the information to the cloud server.
- After receiving the information, the server updates the items in the database.
- Finally, the tag has the following: . Registration is complete.
3.3.2. NFC Reader
- The NFC-enabled phone sends a request to the cloud server for private key generation. The request contains its identity information ().
- After the server receives the messages, it generates the phone’s private key and initializes , , , and records them in the database. Then, the server sends to the phone.
- After the phone receives , it sends a group key distribution request.
- After the server receives the request, it sends the to the phone. The server also records the phone’s in the database.
- Once the phone receives , the registration is completed. After that, the phone has finished the registration and has the following: .
3.4. Data Table in Server
3.5. The Proposed Protocol
- Step 1.
- In order to communicate with the tag, the NFC enabled device generates a random number , then encrypts with using the operation and sends the authentication query to the NFC tag.
- Step 2.
- After the NFC tag receives the query from the phone, it gets . Then the tag uses the group key to encrypt the tag’s identity. Then we have . In the expression , represents the tag’s secret identity. In addition, the tag generates a random number and then it calculates . Lastly, the tag sends the two parts to the phone.
- Step 3.
- After the NFC phone receives message , it gets from the second part of the message and calculates . Afterward, we obtain and encrypt this expression with the phone’s private key . We also add and to the message. After that, the phone sends the following message to the authentication server: .
- Step 4.
- After receiving the message, the cloud server searches a set of values with and gets . Then the server decrypts the message and gets . After searching for in the database, the server gets . Lastly, the server gets . During inspection and decryption, if the server finds that the identity of the device or tag is wrong, the protocol will stop. If the inspection and decryption pass, then the server generates a random number and also a , where is equal to . Then the server calculates and sends the message to the NFC phone. After decryption, the phone sends the message to the tag.
- Step 5.
- Step 5. After the tag receives the message, it gets . Then , if and the tag can confirm that the server and phone are reliable. In the next step, the tag lets the server know that it has received the . The tag generates random number and calculates . Lastly, it sends the calculation result to the server through the phone.
- Step 6.
- Once it has received the relevant message from the mobile phone, the server gets after decryption. The message can be divided into 2 parts. Each part can be used to verify the other. If the is right, the server can confirm that the tag has received the . In order to resist against brute attacks, we should make sure that is changed after each communication. To do this we generate new device keys and synchronize them. The server generates and then . After that, the server generates a new . After completing the above steps, the server calculates and sends it to the tag through the phone.
- Step 7.
- Once it has received the message, the phone gets from and then updates as . After that, the phone sends to the tag.
- Step 8.
- Once it has received the relevant message from the mobile phone, the tag gets after decryption. The two parts of the message can be mutually verified. If is right, the tag updates as . After that, the protocol is complete.
4. Security and Performance Analysis
4.1. Security Analysis
- Tag Anonymity
- Replay Attack Resistance
- Consistent De-synchronization
- Mutual Authentication
- Anti-DoS attack
4.2. Security Comparison
4.3. Performance Analysis and Simulation
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Al-Sarawi, S.; Anbar, M. Internet of things (IoT) communication protocols: Review. In Proceedings of the 2017 8th International Conference on Information Technology (ICIT), Amman, Jordan, 17–18 May 2017; Volume 8, pp. 67–73. [Google Scholar]
- Karam, Y.; Baker, T.; Taleb-Bendiab, A. Security Support for Intention Driven Elastic Cloud Computing. In Proceedings of the 2012 Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, Valetta, Malta, 14–16 November 2012; pp. 67–73. [Google Scholar]
- Ylinen, J.; Kostela, M.; Iso-Anttila, L. Near Field Communication Network Services. In Proceedings of the Third International Conference on the Digital Society, Cancun, Mexico, 1–7 February 2009; pp. 89–93. [Google Scholar]
- Otoum, S.; Kantarci, B.; Mouftah, H.T. Detection of known and unknown intrusive sensor behavior in critical applications. IEEE Sens. Lett. 2017, 1, 1–4. [Google Scholar] [CrossRef]
- Guan, Z.; Li, J.; Wu, L.; Zhang, Y. Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid. IEEE Internet Things 2017, 4, 1934–1944. [Google Scholar] [CrossRef]
- Otoum, S.; Kantarci, B.; Mouftah, H.T. Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017. [Google Scholar]
- Du, X.; Xiao, Y.; Guizani, M.; Chen, H.H. An Effective Key Management Scheme for Heterogeneous Sensor Networks. Ad Hoc Netw. 2007, 5, 24–34. [Google Scholar] [CrossRef]
- Otoum, S.; Kantarci, B.; Mouftah, H.T. Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring. In Proceedings of the 2017 IEEE 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017. [Google Scholar]
- Du, X.; Guizani, M.; Xiao, Y.; Chen, H.H. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks. IEEE T. Wirel. Commun. 2009, 8, 1223–1229. [Google Scholar] [CrossRef]
- Otoum, S.; Kantarci, B.; Mouftah, H.T. Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018. [Google Scholar]
- Ghafir, I.; Saleen, J.; Hammouhed, M.; Faour, H.; Baker, T. Security threats to critical infrastructure: The human factor. J. Supercomput. 2018, 74, 4986–5002. [Google Scholar] [CrossRef]
- Nyikes, Z. Information security issues of RFID. In Proceedings of the IEEE 14th International Symposium on Applied Machine Intelligence and Informatics, Harlan, Slovakia, 21–23 January 2016; pp. 111–114. [Google Scholar]
- Wang, G.C.; Wang, Y.; Li, Y.Z. Authentication Protocol of RFID System Based on Security Policy. In Proceedings of the 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control, Shenyang, China, 21–23 September 2013. [Google Scholar]
- Yang, Y.; Zhen, L.; Chen, Z. Security Analysis of a Mutual Authentication Protocol for RFID Systems. In Proceedings of the IEEE 2th International Conference on Instrumentation, Measurement, Computer, Communication and Control, Harbin, China, 8–10 December 2012. [Google Scholar]
- Chien, H.Y.; Chen, C.H. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Comput. Stand. Interface 2007, 29, 254–259. [Google Scholar] [CrossRef]
- Thammarat, C.; Chokngamwong, R.; Techapanupreeda, C. A Secure Lightweight Protocol for NFC Communications with Mutual Authentication Based on Limited-Use of Session Keys. In Proceedings of the IEEE International Conference on Information Networking, Cambodia, Cambodia, 12–14 January 2015; pp. 133–138. [Google Scholar]
- Maimut, D.; Ouafi, K. Lightweight cryptography for RFID tags. IEEE Secur. Priv. 2012, 10, 76–79. [Google Scholar] [CrossRef]
- Bilal, Z.; Masood, A.; Kausar, F. Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol. In Proceedings of the 2009 International Conference on Network-Based Information Systems(NBIS), Indianapolis, Indiana, 19–21 August 2009; pp. 260–267. [Google Scholar]
- Xie, W.; Xie, L.; Zhang, C. Cloud-based RFID authentication. In Proceedings of the 2013 IEEE International Conference on RFID, 30 April–2 May 2013; pp. 168–175. [Google Scholar]
- Hameed, S.; Hameed, B.; Hussain, S.A. Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters. In Proceedings of the IEEE 13th International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24–26 September 2014; pp. 900–905. [Google Scholar]
- Abughazalah, S.; Markantonakis, K.; Mayes, K. Secure improved cloud-based RFID authentication protocol. In Proceedings of the 9th DPM International Workshop on Data Privacy Management (DPM 2014), Vienna, Austria, 10 September 2015; pp. 147–164. [Google Scholar]
- Baek, J.; Youm, H.Y. Secure and Lightweight Authentication Protocol for NFC Tag Based Services. In Proceedings of the 10th Asia Joint Conference on Information Security, Kaohsiung, Taiwan, 24–26 July 2015. [Google Scholar]
- Avoine, G.; Carpent, X.; Hernandez-Castro, J. Pitfalls in Ultralightweight Authentication Protocol Designs. IEEE Trans. Mob. Comput. 2015, 19, 1–17. [Google Scholar] [CrossRef]
- Baoyun, W. Review on Internet of Things. J. Electron. Meas. Instrum. 2009, 23, 1–7. [Google Scholar]
- Chen, B.C.; Yang, T.C.; Yeh, H.Y.; Lin, C.C. Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID. Appl. Sci. 2016, 6, 215. [Google Scholar] [CrossRef]
- Suzuki, Y.; Niigata, A.; Hamada, M. In-house practice of cloud-based authentication platform service focusing on palm vein authentication. Fujitsu Sci. Tech. J. 2016, 52, 8–14. [Google Scholar]
- Barreto, L.; Celesti, A.; Villari, M.; Fazio, M.; Puliafito, A. An Authentication Model for IoT Clouds. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Paris, France, 25-28 August 2015; pp. 1032–1035. [Google Scholar]
Notation | Description |
---|---|
The startup flag of the authentication protocol | |
IDt | The identification of an NFC tag |
IDp | The identification of a Mobile Phone |
mt, mt’ | Random numbers generated by a tag |
mp, mp’ | Random numbers generated by a phone |
ms, ms’ | Random numbers generated by the cloud server |
The virtual identification generated by an NFC device | |
The old virtual identification of an NFC device | |
The device key owned by a tag | |
An old device key owned by a tag | |
Kp | The device key owned by a phone |
Kgroup | The group key owned by a valid member |
PRNG() | The Pseudo Random Noise Generation function |
The bitwise XOR operation | |
The concatenation operation | |
The modulo-plus operation | |
An authenticate credential generated by the cloud server |
… | … | … | … | … | … |
Authentication Protocols | Tag Anonymity | Replay Attack Resistance | De-Synchronization Attack Resistance | Mutual Authentication | Anti-DoS Attack |
---|---|---|---|---|---|
Chien Protocol [12] | × | √ | √ | √ | × |
Gossamer Protocol [15] | √ | × | × | √ | × |
Xie Protocol [16] | × | √ | √ | × | √ |
Wang Protocol [10] | √ | √ | × | √ | × |
Wei Protocol [11] | √ | √ | √ | × | × |
Baek Protocol [19] | √ | √ | × | × | √ |
Sarah Protocol [18] | × | √ | √ | √ | √ |
New Protocol | √ | √ | √ | √ | √ |
Protocol | Cost Function | Tag’s Computational Cost | Tag’s Memory Cost |
---|---|---|---|
Gossamer protocol | 3 | ||
Xie protocol | 3 | ||
Sarah protocol | 2 | ||
Wang Protocol | 1 | ||
Wei Protocol | 2 | ||
Baek protocol | 2 | ||
New protocol | 3 |
Site Type | Used | Available | Utilization% |
---|---|---|---|
Slice LUTs | 149 | 41,000 | 0.36 |
LUT as Logic | 149 | 41,000 | 0.36 |
LUT as Memory | 0 | 13,400 | 0.00 |
Slice Registers | 262 | 82,000 | 0.32 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fan, K.; Zhang, C.; Yang, K.; Li, H.; Yang, Y. Lightweight NFC Protocol for Privacy Protection in Mobile IoT. Appl. Sci. 2018, 8, 2506. https://doi.org/10.3390/app8122506
Fan K, Zhang C, Yang K, Li H, Yang Y. Lightweight NFC Protocol for Privacy Protection in Mobile IoT. Applied Sciences. 2018; 8(12):2506. https://doi.org/10.3390/app8122506
Chicago/Turabian StyleFan, Kai, Chen Zhang, Kan Yang, Hui Li, and Yintang Yang. 2018. "Lightweight NFC Protocol for Privacy Protection in Mobile IoT" Applied Sciences 8, no. 12: 2506. https://doi.org/10.3390/app8122506
APA StyleFan, K., Zhang, C., Yang, K., Li, H., & Yang, Y. (2018). Lightweight NFC Protocol for Privacy Protection in Mobile IoT. Applied Sciences, 8(12), 2506. https://doi.org/10.3390/app8122506