Energy-Aware RFID Authentication in Edge Computing

Internet of Things (IoT) devices are basic units in edge computing. Denial of service (DoS) attack is a great threat to low-cost IoT devices, even worse in privacy-preserving authentication protocols for radio frequency identification (RFID) tags. During DoS attacks, the attacker consumes the legal...

Full description

Bibliographic Details
Main Authors: Qingsong Yao, Jianfeng Ma, Rui Li, Xinghua Li, Jinku Li, Jiao Liu
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8735851/
id doaj-ec0e43e65b444758ab8d1ac34d3f7e2b
record_format Article
spelling doaj-ec0e43e65b444758ab8d1ac34d3f7e2b2021-03-29T23:26:00ZengIEEEIEEE Access2169-35362019-01-017779647798010.1109/ACCESS.2019.29222208735851Energy-Aware RFID Authentication in Edge ComputingQingsong Yao0https://orcid.org/0000-0002-0895-797XJianfeng Ma1Rui Li2Xinghua Li3Jinku Li4https://orcid.org/0000-0003-0709-7434Jiao Liu5Shaanxi Key Laboratory of Network and System Security, School of Cyber Engineering, Xidian University, Xi’an, ChinaShaanxi Key Laboratory of Network and System Security, School of Cyber Engineering, Xidian University, Xi’an, ChinaSchool of Computer Science and Technology, Xidian University, Shaanxi, Xi’an, ChinaShaanxi Key Laboratory of Network and System Security, School of Cyber Engineering, Xidian University, Xi’an, ChinaShaanxi Key Laboratory of Network and System Security, School of Cyber Engineering, Xidian University, Xi’an, ChinaShaanxi Key Laboratory of Network and System Security, School of Cyber Engineering, Xidian University, Xi’an, ChinaInternet of Things (IoT) devices are basic units in edge computing. Denial of service (DoS) attack is a great threat to low-cost IoT devices, even worse in privacy-preserving authentication protocols for radio frequency identification (RFID) tags. During DoS attacks, the attacker consumes the legal states in a target tag by continuous scanning and further observes its behavior in authentication to break privacy. Due to lack of adequate energy and computing power, it is hard for passive backscattering RFID tags to defend against DoS attacks. In this work, we cast a new insight on the DoS attacks to RFID tags and leverage the malicious scanning behavior as a new energy source. In this way, a passive tag gains more and more energy and can afford more and more complex cryptography computation under a DoS attack. Finally, the victim tag with adequate energy achieves to complete the complicated public key cryptographic computations and defend against the DoS attack. We further propose a protocol, namely the RUND protocol. We define the tracking privacy model and introduce in the notion of tracking interval to define the tracking privacy other than indistinguishable privacy. To guarantee the security and tracking privacy properties of our protocol, we propose 3 rules as designing guidelines. The analysis shows that our approach can achieve $O$ (1) efficiency while providing DoS-defending privacy-preserving authentication. Furthermore, with proper parameters our approach can save about 40% boosting time at least, compared to the directly charging for public key cryptographic computation method.https://ieeexplore.ieee.org/document/8735851/DoS attackpower chargingenergy-awareprivacy-preserving authenticationradio frequency identification (RFID)
collection DOAJ
language English
format Article
sources DOAJ
author Qingsong Yao
Jianfeng Ma
Rui Li
Xinghua Li
Jinku Li
Jiao Liu
spellingShingle Qingsong Yao
Jianfeng Ma
Rui Li
Xinghua Li
Jinku Li
Jiao Liu
Energy-Aware RFID Authentication in Edge Computing
IEEE Access
DoS attack
power charging
energy-aware
privacy-preserving authentication
radio frequency identification (RFID)
author_facet Qingsong Yao
Jianfeng Ma
Rui Li
Xinghua Li
Jinku Li
Jiao Liu
author_sort Qingsong Yao
title Energy-Aware RFID Authentication in Edge Computing
title_short Energy-Aware RFID Authentication in Edge Computing
title_full Energy-Aware RFID Authentication in Edge Computing
title_fullStr Energy-Aware RFID Authentication in Edge Computing
title_full_unstemmed Energy-Aware RFID Authentication in Edge Computing
title_sort energy-aware rfid authentication in edge computing
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description Internet of Things (IoT) devices are basic units in edge computing. Denial of service (DoS) attack is a great threat to low-cost IoT devices, even worse in privacy-preserving authentication protocols for radio frequency identification (RFID) tags. During DoS attacks, the attacker consumes the legal states in a target tag by continuous scanning and further observes its behavior in authentication to break privacy. Due to lack of adequate energy and computing power, it is hard for passive backscattering RFID tags to defend against DoS attacks. In this work, we cast a new insight on the DoS attacks to RFID tags and leverage the malicious scanning behavior as a new energy source. In this way, a passive tag gains more and more energy and can afford more and more complex cryptography computation under a DoS attack. Finally, the victim tag with adequate energy achieves to complete the complicated public key cryptographic computations and defend against the DoS attack. We further propose a protocol, namely the RUND protocol. We define the tracking privacy model and introduce in the notion of tracking interval to define the tracking privacy other than indistinguishable privacy. To guarantee the security and tracking privacy properties of our protocol, we propose 3 rules as designing guidelines. The analysis shows that our approach can achieve $O$ (1) efficiency while providing DoS-defending privacy-preserving authentication. Furthermore, with proper parameters our approach can save about 40% boosting time at least, compared to the directly charging for public key cryptographic computation method.
topic DoS attack
power charging
energy-aware
privacy-preserving authentication
radio frequency identification (RFID)
url https://ieeexplore.ieee.org/document/8735851/
work_keys_str_mv AT qingsongyao energyawarerfidauthenticationinedgecomputing
AT jianfengma energyawarerfidauthenticationinedgecomputing
AT ruili energyawarerfidauthenticationinedgecomputing
AT xinghuali energyawarerfidauthenticationinedgecomputing
AT jinkuli energyawarerfidauthenticationinedgecomputing
AT jiaoliu energyawarerfidauthenticationinedgecomputing
_version_ 1724189604650680320