Business & Management Studies

Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment

5G Mobile Edge Computing Environment

Researchers have developed a new efficient lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment which is shown to be secure against various attacks.

Authors

Srinivas Jangirala, Associate Professor, Jindal Global Business School, O.P. Jindal Global University, Sonipat, Haryana, India.

Ashok Kumar Das, Associate Professor, Center for Security, Theory and Algorithmic Research, International Institute of Information Technology (IIIT), Hyderabad, India.

Athanasios V. Vasilakos, Professor, Department of Computer Science, Electrical and Computer Engineering, Luleå University of Technology, Luleå, Sweden; Computer Science and Technology, Fuzhou University, Fuzhou, China.

Authors

Secure real-time data about goods in transit in supply chains needs bandwidth having capacity that is not fulfilled with the current infrastructure. Hence, 5G-enabled Internet of Things (IoT) in mobile edge computing is intended to substantially increase this capacity. 

To deal with this issue, in this article, we design a new efficient lightweight blockchain-enabled radio frequency identification (RFID)-based authentication protocol for supply chains in 5G mobile edge computing environment, called lightweight blockchain-enabled RFID-based authentication protocol (LBRAPS). LBRAPS is based on bitwise exclusive-or (XOR), one-way cryptographic hash and bitwise rotation operations only. 

LBRAPS is shown to be secure against various attacks. Moreover, the simulation-based formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool assures that LBRAPS is secure. Finally, it is shown that LBRAPS has better trade-off among its security and functionality features, communication and computation costs as compared to those for existing protocols.

Published in: IEEE Transactions on Industrial Informatics

To read the full article, please click here.