Abstract
Radioactive applications are employed in many aspects of our life, such as industry, medicine and agriculture. One of the most important issues that need to be addressed is the security of the movement of radioactive sources. There are many threats that may occur during the transportation of the radioactive sources from one place to another. This paper investigates the security issues in the transportation of the radioactive sources. Thus, it is an attempt to build a secure, real time freight tracking system in which the radioactive source can be under inspection and control at all times during transportation from the shipment provider to the end user. Thus, we proposed a novel lightweight mutual authentication protocol to be used for securing the transportation of radioactive materials. Also, the security requirements for the proposed protocol were verified using the Scyther tool.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Radioactive Sources: Uses, Safety, and Security, Australian Nuclear Science and Technology Organization, August 2016. http://www.arpansa.gov.au/
Sheldon, F.T., Walker, R.M., Abercrombie, R.K., Cline, R.L.: Tracking radioactive sources in commerce. In: WM 2005 Conference, Tucson, AZ, USA, 27 February–3 March 2005
Security of radioactive sources Interim guidance for comment, Printed by the IAEA in Austria, August 2016. http://www-pub.iaea.org/MTCD/Publications/PDF/te_1355_web.pdf/
Federal Authority for Nuclear Regulation, August 2016. http://www.fanr.gov.ae/en/Pages/default.aspx
Ya-Anant, N., Tiyapun, K., Saiyut, K.: Radiological accident and incident in Thailand: lesson to be learned. Radiat. Prot. Dosim. 146(1–3), 111–114 (2011)
Security in the Transport of Radioactive Material, IAEA nuclear security series No. 9, Vienna, August 2016. http://www-pub.iaea.org/MTCD/publications/PDF/Pub1348_web.pdf/
Radiological Dispersal Device (RDD): Argonne National Laboratory, EVS, Human Health Fact Sheet, August 2005
Misra, P., Enge, P.: Global Positioning System: Signals, Measurements, and Performance, 2nd edn. Ganga-Jamun Press, Massachusetts (2010)
Schwieger, V.: Positioning within the GSM network. In: Proceedings on 6th FIG Regional Conference, San Jose, Costa Rica, 12–15 November 2007
Hunt, V., Puglia, A., Puglia, M.: RFID: A Guide to Radio Frequency Identification, 1st edn. Wiley, Hoboken (2007)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2012)
Shemaili, M.B., Yeun, C.Y., Mubarak, K., Zemerly, M.J., Chang, Y.S.: Securing E-seal real time tracking system for internet of things. In: Proceedings of 8th International Conference on Internet Technology and Secured Transactions, 9–12 December 2013, London, UK, pp. 65–69 (2013)
Yeun, C.Y., Shemaili, M.A.B., Zemerly, M.J., Mubarak, K., Yeun, H.K., Chang, Y.S.: ID-based secure real-time tracking system. Int. J. Adv. Logist. 4(2), 100–114 (2015)
Yeun, C.Y., Shemaili, M.A.B., Mubarak, K., Zemerly, M.J.: A new lightweight hybrid cryptographic algorithm for the internet of things. In: Proceedings of 7th International Conference on Internet Technology and Secured Transactions, 10–12 December 2012, London, UK, pp. 87–92 (2012)
Chien, H.Y.: SASI: a new ultra-lightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secur. Comput. 4(4), 337–340 (2007)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A.: Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput. Stand. Interfaces 31(2), 372–380 (2009)
Lo, N.W., Yeh, K.-H.: An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.H. (eds.) EUC 2007. LNCS, vol. 4809, pp. 43–56. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77090-9_5
Chen, C.L., Deng, Y.Y.: Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Eng. Appl. Artif. Intell. 22(8), 1284–1291 (2009)
Habibi, M.H., Gardeshi, M., Alaghband, M.R.: Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard. J. Ubicomp 2(1), 1–13 (2011)
Yeh, T.C., Wang, Y.J., Kuo, T.C., Wang, S.S.: Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst. Appl. 37(12), 7678–7683 (2010)
Safkhani, M., Bagheri, N., Sanadhya, S.K., Naderi, M.: Cryptanalysis of improved Yeh et al.’s authentication protocol: an EPC class-1 generation-2 standard compliant protocol, IACR Cryptology ePrint Archive, Report. 2011/ 426 (2011)
Yoon, E.J.: Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst. Appl. 39(12), 1589–1594 (2012)
Mohammadali, A., Ahmadian, Z., Aref, M.R.: Analysis and improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard, IACR Cryptology ePrint Archive, pp. 66–76 (2013)
Cremers, C.J.F.: The Scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70545-1_38, http://www.cs.ox.ac.uk/people/cas.cremers/scyther/
Cremers, C., Mauw, S., de Vink, E.: Injective synchronisation: an extension of the authentication hierarchy. Theor. Comput. Sci. 367(10), 139–161 (2006). Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Mol. Biol. 147, 195–197 (1981)
Acknowledgements
The authors wish to acknowledge Information and Communication Technology Fund (ICT Fund) for the continued support for the educational development and research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Shemaili, M.A.B. et al. (2018). A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources. In: Hu, J., Khalil, I., Tari, Z., Wen, S. (eds) Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 235. Springer, Cham. https://doi.org/10.1007/978-3-319-90775-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-90775-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-90774-1
Online ISBN: 978-3-319-90775-8
eBook Packages: Computer ScienceComputer Science (R0)