The Journal of Supercomputing

, Volume 74, Issue 7, pp 3148–3167 | Cite as

An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment

  • S. Anandhi
  • R. Anitha
  • Venkatasamy Sureshkumar


Radio frequency identification (RFID) technology enables unique identification and tracking of the tag attached to an object. Widespread usage of RFID technologies in supply chain management (SCM) has drawn attention for developing security protocols to protect data stored in the tag. In SCM objects move from one place/department to another, the same RFID readers are not used throughout the supply chain. So, current reader delegates its access right to the new reader. When an object is moved inside the organization, delegation takes place between the readers. Many of the existing delegation protocols use trusted third party (TTP), which is practically difficult to incorporate or requires a keyed hash function/symmetric key encryption to be executed in the RFID tag, whereas tags are computationally intensive. Our work aims to simplify the delegation process by removing the usage of a TTP as well as eliminating reader-to-reader communication which avoids fixing the reader sequence in advance. Also, it preserves the security and privacy requirements for cloud-based applications. The proposed protocol withstands many attacks like tracing attack, tag impersonation attack, reader impersonation attack, and privacy attack. The proposed protocol not only resists the above-mentioned attacks but also achieves mutual authentication, anonymity property, and forward/backward secrecy. The proposed protocol is analyzed formally using GNY logic, which ensures that the protocol achieves mutual authentication. Performance analysis is carried out and it shows that our protocol is relatively better than the existing related schemes with respect to tag computation and communication cost.


Authentication SCM Cloud computing environment RFID GNY logic Delegation 


  1. 1.
    Avoine G (2017) Security and privacy lounge. Accessed 20 Nov 2017
  2. 2.
    Aghili SF, Ashouri-Talouki M, Mala H (2017) Dos, impersonation and de-synchronization attacks against an ultra-lightweight rfid mutual authentication protocol for iot. J Supercomput 74:1–17Google Scholar
  3. 3.
    Anandhi S, Anitha R, Sureshkumar V (2016) An rfid cloud authentication protocol for object tracking system in supply chain management. In: Digital connectivity–social impact. Communications in Computer and Information Science (CCIS), vol 679. Springer, Singapore, pp 247–256Google Scholar
  4. 4.
    Cao T, Chen X, Doss R, Zhai J, Wise LJ, Zhao Q (2016) Rfid ownership transfer protocol based on cloud. Comput Netw 105:47–59CrossRefGoogle Scholar
  5. 5.
    Chen X, Cao T, Guo Y (2014) A new scalable rfid delegation protocol. Appl Math 8(4):1917–1924Google Scholar
  6. 6.
    Dimitriou T (2016) Key evolving rfid systems: forward/backward privacy and ownership transfer of rfid tags. Ad Hoc Netw 37:195–208CrossRefGoogle Scholar
  7. 7.
    Erguler I, Anarim E (2012) Security flaws in a recent rfid delegation protocol. Pers Ubiquitous Comput 16(3):337–349CrossRefGoogle Scholar
  8. 8.
    Fernndez-Mir A, Trujillo-Rasua R, Castella-Roca J et al (2012) A scalable rfid authentication protocol supporting ownership transfer and controlled delegation. In: International Workshop on Radio Frequency Identification: Security and Privacy Issues. Springer, Heidelberg, pp 147–162Google Scholar
  9. 9.
    Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: Proceedings, 1990 IEEE computer society symposium on research in security and privacy, 1990, pp 234–248. IEEEGoogle Scholar
  10. 10.
    Hugos MH (2018) Essentials of supply chain management. Wiley, New YorkCrossRefGoogle Scholar
  11. 11.
    Kang J (2016) Lightweight mutual authentication rfid protocol for secure multi-tag simultaneous authentication in ubiquitous environments. J Supercomput.
  12. 12.
    Lee C C, Li C T, Cheng CL, Lai Y M, Vasilakos AV (2018) A novel group ownership delegate protocol for rfid systems. Inf Syst Front.
  13. 13.
    Luo JN, Yang MH (2014) An efficient offline delegation protocol in mobile rfid environment. J Netw 9(5):1114–1120Google Scholar
  14. 14.
    Niu H, Taqieddin E, Jagannathan S (2016) Epc gen2v2 rfid standard authentication and ownership management protocol. IEEE Trans Mobile Comput 15(1):137–149CrossRefGoogle Scholar
  15. 15.
    Osborn SL, Wang H (2013) A survey of delegation from an rbac perspective. J Softw 8(2):266–275CrossRefGoogle Scholar
  16. 16.
    Piramuthu S (2012) Vulnerabilities of rfid protocols proposed in isf. Inf Syst Front 14(3):647–651CrossRefGoogle Scholar
  17. 17.
    Plageras AP, Psannis KE, Ishibashi Y, Kim BG (2016) Iot-based surveillance system for ubiquitous healthcare. In: IECON 2016-42nd Annual Conference of the IEEE Industrial Electronics Society, pp 6226–6230. IEEEGoogle Scholar
  18. 18.
    Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta B (2017) Efficient iot-based sensor big data collection-processing and analysis in smart buildings. Future Gener Comput Syst 82:349–357CrossRefGoogle Scholar
  19. 19.
    Plageras AP, Stergiou C, Kokkonis G, Psannis KE, Ishibashi Y, Kim BG, Gupta BB (2017) Efficient large-scale medical data (ehealth big data) analytics in internet of things. In: 2017 IEEE 19th Conference on Business informatics (CBI), vol. 2, pp 21–27. IEEEGoogle Scholar
  20. 20.
    Rostampour S, Bagheri N, Hosseinzadeh M, Khademzadeh A (2017) A scalable and lightweight grouping proof protocol for internet of things applications. J Supercomput 74:1–16Google Scholar
  21. 21.
    Song B, Mitchell CJ (2011) Scalable rfid security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566CrossRefGoogle Scholar
  22. 22.
    Stergiou C, Psannis KE (2017) Efficient and secure big data delivery in cloud computing. Multimed Tools Appl 76(21):22803–22822CrossRefGoogle Scholar
  23. 23.
    Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of iot and cloud computing. Future Gener Comput Syst 78:964–975CrossRefGoogle Scholar
  24. 24.
    Sureshkumar V, Amin R, Anitha R (2017) A robust mutual authentication scheme for session initiation protocol with key establishment. Peer Peer Netw Appl 1–17Google Scholar
  25. 25.
    Tewari A, Gupta B (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using rfid tags. J Supercomput 73(3):1085–1102CrossRefGoogle Scholar
  26. 26.
    Wang KH, Chen CM, Fang W, Wu TY (2017) On the security of a new ultra-lightweight authentication protocol in iot environment for rfid tags. J Supercomput 74:1–6Google Scholar
  27. 27.
    Wang SJ, Wang WL, Huang CT, Chen SC (2011) Improving inventory effectiveness in rfid-enabled global supply chain with grey forecasting model. J Strateg Inf Syst 20(3):307–322CrossRefGoogle Scholar
  28. 28.
    Yang MH (2010) Controlled delegation protocol in mobile rfid networks. EURASIP J Wirel Commun Netw 2010(1):150–170Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Applied Mathematics and Computational SciencesPSG College of TechnologyCoimbatoreIndia

Personalised recommendations