Abstract:In this paper we propose two mutual authentication protocols for RFID systems. Generally, in RFID systems, a reader can authenticate tags in the real-time and batch modes. This paper proposes the first authentication protocol for the real-time mode. It also proposes an efficient robust mutual authentication protocol for the batch mode. Some significant characteristics of the protocols are forward security, tag anonymity, location privacy, low complexity on the backend server, and scalability. To the best of ou… Show more
“…For this, fingerprinting technology can be adopted 60 . RFID security protocols like RWP, 61 AFMAP, 62 and RFID private authentication protocols 63 have been developed. Digital signature technology can also be implemented to ensure data integrity as well as node authentication 21 …”
Section: Analysis Of Some Technology Based Issues In Iot and Existingmentioning
Understanding of any computing environment requires familiarity with its underlying technologies. Internet of Things (IoT), being a new era of computing in the digital world, aims for the development of large number of smart devices that would support a variety of applications and services. These devices are resource-constrained, and the services they would provide are going to impose specific requirements, among which security is the most prominent one. Therefore, in order to comprehend and conform these requirements, there is a need to illuminate the underlying architecture of IoT and its associated elements. This comprehensive survey focuses on the security architecture of IoT and provides a detailed taxonomy of major challenges associated with the field and the key technologies, including Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN), that are enabling factors in the development of IoT. The paper also discusses some of the protocols suitable for IoT infrastructure and open source tools and platforms for its development. Finally, a brief outline of major open issues, along with their potential solutions and future research directions, is given.
“…For this, fingerprinting technology can be adopted 60 . RFID security protocols like RWP, 61 AFMAP, 62 and RFID private authentication protocols 63 have been developed. Digital signature technology can also be implemented to ensure data integrity as well as node authentication 21 …”
Section: Analysis Of Some Technology Based Issues In Iot and Existingmentioning
Understanding of any computing environment requires familiarity with its underlying technologies. Internet of Things (IoT), being a new era of computing in the digital world, aims for the development of large number of smart devices that would support a variety of applications and services. These devices are resource-constrained, and the services they would provide are going to impose specific requirements, among which security is the most prominent one. Therefore, in order to comprehend and conform these requirements, there is a need to illuminate the underlying architecture of IoT and its associated elements. This comprehensive survey focuses on the security architecture of IoT and provides a detailed taxonomy of major challenges associated with the field and the key technologies, including Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN), that are enabling factors in the development of IoT. The paper also discusses some of the protocols suitable for IoT infrastructure and open source tools and platforms for its development. Finally, a brief outline of major open issues, along with their potential solutions and future research directions, is given.
“…After a set of authentication sessions, the list of pseudonyms will need to be reused or updated through an out-of-band channel, which limits the practicality of this scheme. In addition to this there are other lightweight mutual authentication protocols proposed in the literature [4][5][6]. Attacks have been successfully mounted on all of these as demonstrated in literature [7][8][9].…”
Radio Frequency Identification (RFID) systems are increasingly being deployed in a variety of applications. Widespread deployment of such contactless systems raises many security and privacy concerns due to unauthorized eavesdropping reader, de-synchronization between reader and tag etc. In this paper, we propose a light weight mutual authentication protocol which is an improvement over Li's extended LMAP+ protocol. In mutual authentication, the tag and the reader of the RFID systems will authenticate each other before transmitting unique ID of tag. The proposed protocol provides protection over traceability and de-synchronization attacks.
“…This is indeed noticeable throughout the literature on RFID [1,2]. Furthermore, within RFID system structure context, many lightweight RFID authentication protocols [3][4][5] and grouping proof protocols [6][7][8] are proposed to be implemented over the practically required secure RFID channels. Recently, the grouping proof protocol is adopted to improve patient safety.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.