Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 2349149, 7 pages
https://doi.org/10.1155/2017/2349149
Research Article

ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G

1State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an, China
2Key Laboratory of Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi’an, China

Correspondence should be addressed to Kai Fan; nc.ude.naidix.liam@nafk

Received 24 January 2017; Revised 3 March 2017; Accepted 20 March 2017; Published 27 April 2017

Academic Editor: Jing Zhao

Copyright © 2017 Kai Fan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Ning and B. Wang, RFID Major Projects and the State Internet of Things, Mechanical Industry Press, Beijing, China, 2008.
  2. V. Odelu, A. K. Das, and A. Goswami, “SEAP: secure and efficient authentication protocol for NFC applications using pseudonyms,” IEEE Transactions on Consumer Electronics, vol. 62, no. 1, pp. 30–38, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Yun-Seok, K. Eun, and J. Min-Soo, “A NFC based authentication method for defense of the man in the middle attack,” in Proceedings of the 3rd International Conference on Computer Science and Information Technology, Bali, Indonesia, January 2013.
  4. K. Fan, J. Li, H. Li, X. Liang, X. Shen, and Y. Yang, “RSEL: revocable secure efficient lightweight RFID authentication scheme,” Concurrency Computation Practice and Experience, vol. 26, no. 5, pp. 1084–1096, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. E. Haselsteiner, “Security in near field communication (NFC),” in Proceedings of the Workshop on RFID Security, Malaga, Hungary, 2006.
  6. K. Fan, Y. Gong, C. Liang, H. Li, and Y. Yang, “Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G,” Security and Communication Networks, vol. 9, pp. 3095–3104, 2016. View at Google Scholar
  7. M. Dong, K. Ota, L. T. Yang, A. Liu, and M. Guo, “LSCD: a low-storage clone detection protocol for cyber-physical systems,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 5, pp. 712–723, 2016. View at Publisher · View at Google Scholar · View at Scopus
  8. L. Zhang, L. Wei, D. Huang, K. Zhang, M. Dong, and K. Ota, “MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing,” Security and Communication Networks, vol. 9, no. 16, pp. 3777–3789, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. J. C. Paillès, C. Gaber, V. Alimi, and M. Pasquet, “Payment and privacy: a key for the development of NFC mobile,” in Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS '10), pp. 378–385, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Hassinen, K. Hyppönen, and E. Trichina, “Utilizing national public-key infrastructure in mobile payment systems,” Electronic Commerce Research and Applications, vol. 7, no. 2, pp. 214–231, 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Kabir, User centric design of an NFC mobile wallet framework [M.S. thesis], The Royal Institute of Technology (KTH), Stockholm, Sweden, 2011.
  12. E. G. Ahmed, E. Shaaban, and M. Hashem, “Lightweight mutual authentication protocol for low cost RFID tags,” International journal of Network Security & Its Applications, vol. 2, no. 2, pp. 27–37, 2010. View at Publisher · View at Google Scholar
  13. A. Juels, “Strengthening EPC tags against cloning,” in Proceedings of the ACM Workshop on Wireless Security (WiSe '05), pp. 67–75, Cologne, Germany, September 2005. View at Scopus
  14. C. Mulliner, “Vulnerability analysis and attacks on NFC-enabled mobile phones,” in Proceedings of the 4th International Conference on Availability, Reliability and Security, pp. 695–700, IEEE, Fukuoka, Japan, March 2009.
  15. L. Francis, G. P. Hancke, K. Mayes et al., “Practical NFC peer-to-peer relay attack using mobile phones,” in Proceedings of the 6th International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFID-SEC '10), pp. 35–49, Istanbul, Turkey, 2010.
  16. P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “LAMED—a PRNG for EPC class-1 generation-2 RFID specification,” Computer Standards and Interfaces, vol. 31, no. 1, pp. 88–97, 2009. View at Publisher · View at Google Scholar · View at Scopus
  17. L. Gu, L. Wang, K. Ota, M. Dong, Z. Cao, and Y. Yang, “New public key cryptosystems based on non-Abelian factorization problems,” Security and Communication Networks, vol. 6, no. 7, pp. 912–922, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. F. Fahrianto, M. F. Lubis, and A. Fiade, “Denial-of-service attack possibilities on NFC technology,” in Proceedings of the 4th International Conference on Cyber and IT Service Management, pp. 1–5, IEEE, April 2016. View at Publisher · View at Google Scholar
  19. P. Peris-Lopez, J. C. Hernandez-Castro, J. M. E. Tapiador et al., “LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags,” in Proceedings of the Workshop on RFID Security, Graz, Austria, July 2006.
  20. H.-Y. Chien, “SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 337–340, 2007. View at Publisher · View at Google Scholar · View at Scopus