Skip to main content

A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources

  • Conference paper
  • First Online:
Mobile Networks and Management (MONAMI 2017)

Abstract

Radioactive applications are employed in many aspects of our life, such as industry, medicine and agriculture. One of the most important issues that need to be addressed is the security of the movement of radioactive sources. There are many threats that may occur during the transportation of the radioactive sources from one place to another. This paper investigates the security issues in the transportation of the radioactive sources. Thus, it is an attempt to build a secure, real time freight tracking system in which the radioactive source can be under inspection and control at all times during transportation from the shipment provider to the end user. Thus, we proposed a novel lightweight mutual authentication protocol to be used for securing the transportation of radioactive materials. Also, the security requirements for the proposed protocol were verified using the Scyther tool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Radioactive Sources: Uses, Safety, and Security, Australian Nuclear Science and Technology Organization, August 2016. http://www.arpansa.gov.au/

  2. Sheldon, F.T., Walker, R.M., Abercrombie, R.K., Cline, R.L.: Tracking radioactive sources in commerce. In: WM 2005 Conference, Tucson, AZ, USA, 27 February–3 March 2005

    Google Scholar 

  3. Security of radioactive sources Interim guidance for comment, Printed by the IAEA in Austria, August 2016. http://www-pub.iaea.org/MTCD/Publications/PDF/te_1355_web.pdf/

  4. Federal Authority for Nuclear Regulation, August 2016. http://www.fanr.gov.ae/en/Pages/default.aspx

  5. Ya-Anant, N., Tiyapun, K., Saiyut, K.: Radiological accident and incident in Thailand: lesson to be learned. Radiat. Prot. Dosim. 146(1–3), 111–114 (2011)

    Article  Google Scholar 

  6. Security in the Transport of Radioactive Material, IAEA nuclear security series No. 9, Vienna, August 2016. http://www-pub.iaea.org/MTCD/publications/PDF/Pub1348_web.pdf/

  7. Radiological Dispersal Device (RDD): Argonne National Laboratory, EVS, Human Health Fact Sheet, August 2005

    Google Scholar 

  8. Misra, P., Enge, P.: Global Positioning System: Signals, Measurements, and Performance, 2nd edn. Ganga-Jamun Press, Massachusetts (2010)

    Google Scholar 

  9. Schwieger, V.: Positioning within the GSM network. In: Proceedings on 6th FIG Regional Conference, San Jose, Costa Rica, 12–15 November 2007

    Google Scholar 

  10. Hunt, V., Puglia, A., Puglia, M.: RFID: A Guide to Radio Frequency Identification, 1st edn. Wiley, Hoboken (2007)

    Book  Google Scholar 

  11. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2012)

    Article  Google Scholar 

  12. Shemaili, M.B., Yeun, C.Y., Mubarak, K., Zemerly, M.J., Chang, Y.S.: Securing E-seal real time tracking system for internet of things. In: Proceedings of 8th International Conference on Internet Technology and Secured Transactions, 9–12 December 2013, London, UK, pp. 65–69 (2013)

    Google Scholar 

  13. Yeun, C.Y., Shemaili, M.A.B., Zemerly, M.J., Mubarak, K., Yeun, H.K., Chang, Y.S.: ID-based secure real-time tracking system. Int. J. Adv. Logist. 4(2), 100–114 (2015)

    Article  Google Scholar 

  14. Yeun, C.Y., Shemaili, M.A.B., Mubarak, K., Zemerly, M.J.: A new lightweight hybrid cryptographic algorithm for the internet of things. In: Proceedings of 7th International Conference on Internet Technology and Secured Transactions, 10–12 December 2012, London, UK, pp. 87–92 (2012)

    Google Scholar 

  15. Chien, H.Y.: SASI: a new ultra-lightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secur. Comput. 4(4), 337–340 (2007)

    Article  Google Scholar 

  16. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A.: Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput. Stand. Interfaces 31(2), 372–380 (2009)

    Article  Google Scholar 

  17. Lo, N.W., Yeh, K.-H.: An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.H. (eds.) EUC 2007. LNCS, vol. 4809, pp. 43–56. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77090-9_5

    Chapter  Google Scholar 

  18. Chen, C.L., Deng, Y.Y.: Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Eng. Appl. Artif. Intell. 22(8), 1284–1291 (2009)

    Article  Google Scholar 

  19. Habibi, M.H., Gardeshi, M., Alaghband, M.R.: Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard. J. Ubicomp 2(1), 1–13 (2011)

    Article  Google Scholar 

  20. Yeh, T.C., Wang, Y.J., Kuo, T.C., Wang, S.S.: Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst. Appl. 37(12), 7678–7683 (2010)

    Article  Google Scholar 

  21. Safkhani, M., Bagheri, N., Sanadhya, S.K., Naderi, M.: Cryptanalysis of improved Yeh et al.’s authentication protocol: an EPC class-1 generation-2 standard compliant protocol, IACR Cryptology ePrint Archive, Report. 2011/ 426 (2011)

    Google Scholar 

  22. Yoon, E.J.: Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst. Appl. 39(12), 1589–1594 (2012)

    Article  Google Scholar 

  23. Mohammadali, A., Ahmadian, Z., Aref, M.R.: Analysis and improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard, IACR Cryptology ePrint Archive, pp. 66–76 (2013)

    Google Scholar 

  24. Cremers, C.J.F.: The Scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70545-1_38, http://www.cs.ox.ac.uk/people/cas.cremers/scyther/

    Chapter  Google Scholar 

  25. Cremers, C., Mauw, S., de Vink, E.: Injective synchronisation: an extension of the authentication hierarchy. Theor. Comput. Sci. 367(10), 139–161 (2006). Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Mol. Biol. 147, 195–197 (1981)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors wish to acknowledge Information and Communication Technology Fund (ICT Fund) for the continued support for the educational development and research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chan Yeob Yeun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shemaili, M.A.B. et al. (2018). A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources. In: Hu, J., Khalil, I., Tari, Z., Wen, S. (eds) Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 235. Springer, Cham. https://doi.org/10.1007/978-3-319-90775-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-90775-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-90774-1

  • Online ISBN: 978-3-319-90775-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics