Wireless Personal Communications

, Volume 104, Issue 2, pp 543–560 | Cite as

IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics

  • S. AnandhiEmail author
  • R. Anitha
  • Venkatasamy Sureshkumar


Object tracking is a fundamental problem in Supply Chain Management (SCM). Recent innovations eliminate the difficulties in traditional approach such as manual counting, locating the object, and data management. Radio Frequency Identification (RFID) implementation in SCM improves the visibility of real-time object movement and provide solutions for anti-counterfeiting. RFID is a major prerequisite for the IoT, which connects physical objects to the Internet. Various research works have been carried out to perform object tracking using GPS, video cameras, and wifi technology. These methods just hope to see the actual object, but not the characteristic changes of the object due to environmental changes. After reviewing the implementation of latest technologies in object tracking system, it is expected that the security and privacy risks in large-scale IoT systems are to be eliminated and an efficient IoT services are provided to SCM. In this work, an architecture is proposed for a fine-grained IoT-enabled online object tracking system. Cloud storage used in this architecture enhances the scalability and data management. We propose a novel secure and efficient end to end authentication protocol that is based on a symmetric key cryptosystem and one-way hash function. A new scheme is also proposed to address object tracking communication flow which uses the secret key established in the authentication process. A formal security analysis method, GNY logic is used and proved that the proposed protocol achieves an end to end authentication. Tag/Reader impersonation attack and replay attack are prevented in the proposed scheme. It also preserves forward and backward secrecy. Performance analysis shows that the proposed protocol is not storage and computationally intensive.


Mutual authentication SCM Cloud environment RFID GNY logic Object tracking 



  1. 1.
    Agarwal, P., Kahlon, S. S., Bisht, N., Dash, P., Ahuja, S., & Goyal, A. (2018). Abandoned object detection and tracking using cctv camera. In D. K. Mishra, M. K. Nayak & A. Joshi (Eds.), Information and communication technology for sustainable development (pp. 483–492). Singapore: Springer.CrossRefGoogle Scholar
  2. 2.
    Bauk, S., Draskovic, M., & Schmeink, A. (2017). Challenges of tagging goods in supply chains and a cloud perspective with focus on some transitional economies. PROMET-Traffic and Transportation, 29(1), 109–120.CrossRefGoogle Scholar
  3. 3.
    Benssalah, M., Djeddou, M., & Drouiche, K. (2017). A provably secure rfid authentication protocol based on elliptic curve signature with message recovery suitable for m-health environments. Transactions on Emerging Telecommunications Technologies, 28(11), e3166.CrossRefGoogle Scholar
  4. 4.
    Bibi, F., Guillaume, C., Gontard, N., & Sorli, B. (2017). A review: Rfid technology having sensing aptitudes for food industry and their contribution to tracking and monitoring of food products. Trends in Food Science and Technology, 62, 91–103.CrossRefGoogle Scholar
  5. 5.
    Bilal, Z., Masood, A., & Kausar, F. (2009). Security analysis of ultra-lightweight cryptographic protocol for low-cost rfid tags: Gossamer protocol. In International conference on network-based information systems, 2009, NBIS’09 (pp. 260–267). IEEE.Google Scholar
  6. 6.
    Chen, B. C., Yeh, H. T., & Wang, C. C. (2016). The construction of mobile rfid authentication mechanism and relative ownership transfer protocols for supply chain. Engineering Computations, 33(6), 1825–1834.CrossRefGoogle Scholar
  7. 7.
    Chen, Q., Ding, D., & Zheng, Y. (2018). Indoor pedestrian tracking with sparse rss fingerprints. Tsinghua Science and Technology, 23(1), 95–103.CrossRefGoogle Scholar
  8. 8.
    Chien, H. Y. (2007). Sasi: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.CrossRefGoogle Scholar
  9. 9.
    EPCglobal, G. (2013). Epc radio-frequency identity protocols generation-2 uhf rfid. Specification for rfid air interface protocol for communications at 860 mhz-960 mhz. Milan: EPCglobal Inc.Google Scholar
  10. 10.
    Fan, K., Ge, N., Gong, Y., Li, H., Su, R., & Yang, Y. (2017). An ultra-lightweight rfid authentication scheme for mobile commerce. Peer-to-Peer Networking and Applications, 10(2), 368–376.CrossRefGoogle Scholar
  11. 11.
    Fan, K., Wang, W., Jiang, W., Li, H., & Yang, Y. (2017). Secure ultra-lightweight rfid mutual authentication protocol based on transparent computing for iov. Peer-to-Peer Networking and Applications, 11(4), 723–734.CrossRefGoogle Scholar
  12. 12.
    Fan, T., Tao, F., Deng, S., & Li, S. (2015). Impact of rfid technology on supply chain decisions with inventory inaccuracies. International Journal of Production Economics, 159, 117–125.CrossRefGoogle Scholar
  13. 13.
    Gong, L., Needham, R., & Yahalom, R. (1990). Reasoning about belief in cryptographic protocols. In IEEE computer society symposium on research in security and privacy 1990. Proceedings 1990 (pp. 234–248). IEEE.Google Scholar
  14. 14.
    Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for iot and cloud servers. Pervasive and Mobile Computing, 24, 210–223.CrossRefGoogle Scholar
  15. 15.
    Kibria, M. G., Kim, H. S., & Chong, I. (2016). Tracking moving objects for intelligent iot service provisioning in web objects enabled iot environment. In 2016 International conference on information and communication technology convergence (ICTC) (pp. 561–563). IEEE.Google Scholar
  16. 16.
    Kim, D. H., Park, J. B., Shin, J. H., & Kim, J. D. (2017). Design and implementation of object tracking system based on lora. In 2017 International conference on information networking (ICOIN) (pp. 463–467). IEEE.Google Scholar
  17. 17.
    Kumar, N., Kaur, K., Misra, S. C., & Iqbal, R. (2016). An intelligent rfid-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications, 9(5), 824–840.CrossRefGoogle Scholar
  18. 18.
    Landmark, A. D., Landmark, A. D., Sjøbakk, B., & Sjøbakk, B. (2017). Tracking customer behaviour in fashion retail using rfid. International Journal of Retail and Distribution Management, 45(7/8), 844–858.CrossRefGoogle Scholar
  19. 19.
    Lee, C. C., Li, C. T., Cheng, C. L., Lai, Y. M., & Vasilakos, A. V. (2018). A novel group ownership delegate protocol for rfid systems. Information Systems Frontiers. Scholar
  20. 20.
    Li, C. T., Lee, C. C., Weng, C. Y., & Chen, C. M. (2017). Towards secure authenticating of cache in the reader for rfid-based iot systems. Peer-to-Peer Networking and Applications, 11(1), 198–208.CrossRefGoogle Scholar
  21. 21.
    Lv, C., Li, H., Ma, J., & Zhang, Y. (2012). Vulnerability analysis of elliptic curve cryptography-based rfid authentication protocols. Transactions on Emerging Telecommunications Technologies, 23(7), 618–624.CrossRefGoogle Scholar
  22. 22.
    Mitrokotsa, A., Rieback, M. R., & Tanenbaum, A. S. (2010). Classifying rfid attacks and defenses. Information Systems Frontiers, 12(5), 491–505.CrossRefGoogle Scholar
  23. 23.
    Mohit, P., Amin, R., & Biswas, G. (2017). Design of authentication protocol for wireless sensor network-based smart vehicular system. Vehicular Communications, 9, 64–71.CrossRefGoogle Scholar
  24. 24.
    Naskar, S., Basu, P., & Sen, A. K. (2017). A literature review of the emerging field of iot using rfid and its applications in supply chain management. In The Internet of Things in the Modern Business Environment (pp. 1–27). IGI Global.Google Scholar
  25. 25.
    Ray, B., Howdhury, M., Abawajy, J., & Jesmin, M. (2015). Secure object tracking protocol for networked rfid systems. In 2015 16th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD) (pp. 1–7). IEEE.Google Scholar
  26. 26.
    Ray, B. R., Chowdhury, M. U., & Abawajy, J. H. (2016). Secure object tracking protocol for the internet of things. IEEE Internet of Things Journal, 3(4), 544–553.CrossRefGoogle Scholar
  27. 27.
    Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things Journal, 1(1), 3–9.MathSciNetCrossRefGoogle Scholar
  28. 28.
    Tan, A. (2018). Vehicle object monitoring system. US Patent 9,880,253.Google Scholar
  29. 29.
    Wu, Y., Lim, J., & Yang, M. H. (2015). Object tracking benchmark. IEEE Transactions on Pattern Analysis and Machine Intelligence, 37(9), 1834–1848.CrossRefGoogle Scholar
  30. 30.
    Yang, K., Forte, D., & Tehranipoor, M. M. (2017). Cdta: A comprehensive solution for counterfeit detection, traceability, and authentication in the iot supply chain. ACM Transactions on Design Automation of Electronic Systems (TODAES), 22(3), 42.CrossRefGoogle Scholar
  31. 31.
    Ye, N., Zhu, Y., Wang, R. C., & Lin, Q. M. (2014). An efficient authentication and access control scheme for perception layer of internet of things. Applied Mathematics and Information Sciences, 8, 1617–1624.CrossRefGoogle Scholar
  32. 32.
    Zhou, S., Zhang, Z., Luo, Z., & Wong, E. C. (2010). A lightweight anti-desynchronization rfid authentication protocol. Information Systems Frontiers, 12(5), 521–528.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • S. Anandhi
    • 1
    Email author
  • R. Anitha
    • 1
  • Venkatasamy Sureshkumar
    • 1
  1. 1.Department of Applied Mathematics and Computational SciencesPSG College of TechnologyCoimbatoreIndia

Personalised recommendations