Loading…
ReSOTS: RFID/IoT-Enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
Smart logistics is acknowledged as a key propellant for swift industrialization and economic growth of the nations. It not only helps to foster the cost-effective services to the end user but also brings transparency in the whole supply chain management process by creating a communicative ecosystem...
Saved in:
Published in: | Wireless personal communications 2024-10, Vol.139 (2), p.777-799 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Smart logistics is acknowledged as a key propellant for swift industrialization and economic growth of the nations. It not only helps to foster the cost-effective services to the end user but also brings transparency in the whole supply chain management process by creating a communicative ecosystem involving IoT, RFID and other Information Communication Technology-enabled objects. Realizing the notion of smart logistics involves the real time communication as well as tracking through 5G-enabled Internet of Things (IoT) and interconnected nodes. Nonetheless, mere technological innovations are not sufficient, until all supply chain-based intermediaries are secure and trustworthy. Moreover, the smart interacting devices exchanging bulk of data are power scarce devices requiring energy efficient communication techniques. For this reason the underlying protocol authenticating the supply chain intermediaries must not only be secure but also computationally efficient. Many authenticated key agreement solutions can be witnessed lately, however with many limitations. Considering these limitations we propose a novel RFID/IoT-enabled secure symmetric key-based authentication protocol (ReSOTS) for tracking the objects in smart logistics-based ecosystem, thereby greatly reducing the computational overheads with adequate security. The scheme is formally analyzed and validated under RoR-based random oracle model. The performance results indicate promising results for the contributed scheme over the comparative studies. |
---|---|
ISSN: | 0929-6212 1572-834X |
DOI: | 10.1007/s11277-024-11598-y |