Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things

Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio freq...

Full description

Bibliographic Details
Main Authors: Adarsh Kumar, Krishna Gopal, Alok Aggarwal
Format: Article
Language:English
Published: Croatian Communications and Information Society (CCIS) 2014-09-01
Series:Journal of Communications Software and Systems
Subjects:
Online Access:https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/122
id doaj-b728245201814c0daf1b4c3f30033d79
record_format Article
spelling doaj-b728245201814c0daf1b4c3f30033d792020-11-24T20:47:14ZengCroatian Communications and Information Society (CCIS)Journal of Communications Software and Systems1845-64211846-60792014-09-01103179187Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of ThingsAdarsh KumarKrishna GopalAlok AggarwalInternet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio frequency based addressing scheme in IoT. Major security challenge in resource constraint RFID networks is how to achieve traditional CIA security i.e. Confidentiality, Integrity and Authentication. Computational and communication costs for Lightweight Mutual Authentication Protocol (LMAP), RFID mutual Authentication Protocol with Permutation (RAPP) and kazahaya authentication protocols are analyzed. These authentication protocols are modeled to analyze the delays using lightweight modeling language. Delay analysis is performed using alloy model over LMAP, RAPP and kazahaya authentication protocols where one datacenter (DC) is connected to different number of readers (1,5 or 10) with connectivity to 1, 5 or 25 tags associated with reader and its results show that for LMAP delay varies from 30-156 msec, for RAPP from 31-188 while for kazahaya from 61-374 msec. Further, performance of RFID authentication protocols is analyzed for group construction through more than one DC (1,5 or 10) with different number of readers (10, 50 or 100) and tags associated with these readers (50, 500, 1000) and results show that DC based binary tree topology with LMAP authentication protocol is having a minimum delay for 50 or 100 readers. Other authentication protocols fail to give authentication results because of large delays in the network. Thus, RAPP and Kazahaya are not suitable for scenarios where there is large amount of increase in number of tags or readers. https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/122AuthenticationGroupingLightweightModelingRFID
collection DOAJ
language English
format Article
sources DOAJ
author Adarsh Kumar
Krishna Gopal
Alok Aggarwal
spellingShingle Adarsh Kumar
Krishna Gopal
Alok Aggarwal
Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things
Journal of Communications Software and Systems
Authentication
Grouping
Lightweight
Modeling
RFID
author_facet Adarsh Kumar
Krishna Gopal
Alok Aggarwal
author_sort Adarsh Kumar
title Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things
title_short Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things
title_full Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things
title_fullStr Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things
title_full_unstemmed Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things
title_sort cost and lightweight modeling analysis of rfid authentication protocols in resource constraint internet of things
publisher Croatian Communications and Information Society (CCIS)
series Journal of Communications Software and Systems
issn 1845-6421
1846-6079
publishDate 2014-09-01
description Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio frequency based addressing scheme in IoT. Major security challenge in resource constraint RFID networks is how to achieve traditional CIA security i.e. Confidentiality, Integrity and Authentication. Computational and communication costs for Lightweight Mutual Authentication Protocol (LMAP), RFID mutual Authentication Protocol with Permutation (RAPP) and kazahaya authentication protocols are analyzed. These authentication protocols are modeled to analyze the delays using lightweight modeling language. Delay analysis is performed using alloy model over LMAP, RAPP and kazahaya authentication protocols where one datacenter (DC) is connected to different number of readers (1,5 or 10) with connectivity to 1, 5 or 25 tags associated with reader and its results show that for LMAP delay varies from 30-156 msec, for RAPP from 31-188 while for kazahaya from 61-374 msec. Further, performance of RFID authentication protocols is analyzed for group construction through more than one DC (1,5 or 10) with different number of readers (10, 50 or 100) and tags associated with these readers (50, 500, 1000) and results show that DC based binary tree topology with LMAP authentication protocol is having a minimum delay for 50 or 100 readers. Other authentication protocols fail to give authentication results because of large delays in the network. Thus, RAPP and Kazahaya are not suitable for scenarios where there is large amount of increase in number of tags or readers.
topic Authentication
Grouping
Lightweight
Modeling
RFID
url https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/122
work_keys_str_mv AT adarshkumar costandlightweightmodelinganalysisofrfidauthenticationprotocolsinresourceconstraintinternetofthings
AT krishnagopal costandlightweightmodelinganalysisofrfidauthenticationprotocolsinresourceconstraintinternetofthings
AT alokaggarwal costandlightweightmodelinganalysisofrfidauthenticationprotocolsinresourceconstraintinternetofthings
_version_ 1716810574638088192