IJCNIS Vol. 7, No. 4, 8 Mar. 2015
Cover page and Table of Contents: PDF (size: 564KB)
Full Text (PDF, 564KB), PP.44-53
Views: 0 Downloads: 0
Authentication, Detection probability, Multi-tag, RFID, Security
Authentication is an important requirement in various applications to restrict the non-legitimate access to certain resources. Radio Frequency Identification (RFID) technology helps to perform the authentication task. The detection probability of an object during the authentication process can be increased using multiple number of RFID tags in the object. However, many security risks such as eavesdropping, location privacy etc. are involved in this technology. This paper proposes a secure and lightweight authentication scheme assuming the objects are attached with multiple number of RFID tags. Proper analysis has been carried out to evaluate the security of the proposed scheme, including comparison with a few existing schemes in terms of computation, communication and storage requirements.
Subhasish Dhal, Indranil Sen Gupta, "Object Authentication Using RFID Technology: A Multi-tag Approach", International Journal of Computer Network and Information Security(IJCNIS), vol.7, no.4, pp.44-53, 2015. DOI:10.5815/ijcnis.2015.04.06
[1]H. Chien, "Tree-Based Matched RFID Yoking Making It More Practical and Efficient", Journal of Computer Network and Information Security, vol. 1, no. 1, pp. 1-9, 2009.
[2]V. K. N. Kumar and B. Srinivasan, "Design and Development of Biometrics Secure Person Detection System for E-Passport using Cryptographic Security Protocols", Journal of Computer Network and Information Security, vol. 5, no. 12, pp. 80-90, 2013.
[3]L. Bolotnyy and G. Robins, “Multi-Tag RFID Systems," Journal of Internet Protocol Technology (IJIPT), Special issue on RFID: Technologies, Applications, and Trends, vol. 2, no. 3/4, pp. 218?231, 2007.
[4]S. Dhal and I. Sen gupta, "Managing Authentication and Detection Probability in Multi-tag RFID System", Journal of Information Assurance and Security, vol. 9, no. 6, pp. 316-328, 2014.
[5]S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," in Proceedings of the 1st Conference on Security in Pervasive Computing, pp. 201?212, 2004.
[6]B. Song and C. J. Mitchell, “RFID Authentication Protocol for Low-cost Tags," in Proceedings of the 1st ACM Conference on Wireless Network Security, pp. 140?147, 2008.
[7]C. C. Tan, B. Sheng, and Q. Li, “Serverless Search and Authentication Protocols for RFID," in Proceedings of the 5th Conference on Pervasive Computing and Communication, pp. 3?12, 2007.
[8]G. Tsudik, “A family of dunces: Trivial RFID identification and authentication protocols," in Proceedings of Privacy Enhancing Technologies Symposium, pp. 45?61, 2007.
[9]M. Burmester, T. V. Le, and B. D. Medeiros, “Provably secure ubiquitous systems: Universally composable RFID authentication protocols," in Proceedings of SECURECOMM, pp. 1?9, 2006.
[10]M. Conti, R. D. Pietro, and L. V. Mancini, “RIPP-FS: an RFID Identification, Privacy Preserving Protocol with Forward Secrecy," in Proceedings of the 5th Conference on Pervasive Computing and Communication, pp. 229?234, 2007.
[11]G. R. Li, Y.Wang, C. R.Wang, and J. S. He, “Emap: An efficient mutual authentication protocol for passive RFID tags," Journal of Automation and Computing, vol. 9, pp. 108?112, 2012.
[12]H. J. Kim and M. S. Jun, “Light-weight Mutual Authentication RFD Protocol for Multi-Tags conforming to ESC Class-1 Generation-2 Standards," in Proceedings of the 5th International Conference on Computer Sciences and Convergence Information Technology, pp. 34?39, 2010.
[13]P. Rizomiliotis, E. Rekleitis, and S. Gritzalis, “Security Analysis of the Song-Mitchell Authentication Protocol for Low-cost RFID Tags," Communications Letters, vol. 13, no. 4, pp. 274?276, 2009.
[14]S. Dhal and I. Sengupta, “A New authentication Protocol for Multi-tag RFID Applicable to Passive Tag," in Proceedings of the International Conference on Communication, Computing & Security, pp. 880?888, 2012.
[15]C. E. Shannon, “A Mathematical Theory of Communication," The Bell System Technical Journal, vol. 27, pp. 379?423, 1984.
[16]D. Mukhopadhyay, “Design and Analysis of Cellular Automata Based Cryptographic Algorithms," Ph. D thesis, Indian Institute of Technology Kharagpur, India, 2007.