Mutual authentication protocol for low cost passive tag in RFID system

被引:1
作者
Kumar A. [1 ]
Jain A.K. [1 ]
机构
[1] Department of Computer Engineering, National Institute of Technology, Kurukshetra
关键词
Authentication; IoT; Passive tag; RFID;
D O I
10.1007/s41870-021-00632-y
中图分类号
学科分类号
摘要
Internet of things (IoT) contains a massive number of “things” that are connected to the internet and communicates without human interaction. In these IoT devices, Radio frequency identification is used to detect the location of devices in communication networks. However, the RFID tag contains a low power battery and low memory capacity (i.e., few KB). Hence, it requires a lightweight or ultra-lightweight solutions for these RFID tags. This paper proposes a novel ultra-lightweight authenticate approach for a passive tag that uses XOR and rotate operations. This scheme contains three different phases: tag identification, mutual authentication, and pseudonyms and key updating phases. The first phase comprises the identification of the tag. After that, the second phase performs mutual authentication between the tag and the reader. The last phase involves the updating of the key between the tag and the reader. This scheme also defines the function “MIX” to enhance the security of the protocol. This scheme analyses in terms of communication cost between tag and reader, and storage cost for a passive tag. © 2021, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:1209 / 1215
页数:6
相关论文
共 21 条
[1]  
(2015)
[2]  
Greengard S., Smart transportation networks drive gains, Commun ACM, 58, 1, (2015)
[3]  
Fang X., Misra S., Xue G., Yang D., Smart grid—the new and improved power grid: a survey, IEEE Commun Surv Tutor, 14, 4, (2012)
[4]  
Cocchia A., Smart City, pp. 13-43, (2014)
[5]  
Ge M., Hong J.B., Guttmann W., Kim D.S., A framework for automating security analysis of the internet of things, J Netw Comput Appl, 83, (2017)
[6]  
Luqman M., Faridi A.R., 2018 4th international conference on computing communication and automation, 83, (2018)
[7]  
Conti M., Dehghantanha A., Franke K., Watson S., Internet of things security and forensics: Challenges and opportunities, (2018)
[8]  
Finkenzeller K., Handbook R.F.I.D., Fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication, (2010)
[9]  
Chien H.Y., SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity, IEEE Trans Depend Secure Comput, 4, 4, (2007)
[10]  
Avoine G., Carpent X., Hernandez-Castro J., Pitfalls in ultralightweight authentication protocol designs, IEEE Trans Mob Comput, 15, 9, (2016)