Active RFID System with Cryptography and Authentication Mechanisms
نویسندگان
چکیده
Radio frequency identification (RFID) systems have recently been used in a large number of applications. Security and privacy issues have also imposed significant challenges on these systems. Cryptography and authentication protocols have been utilized to effectively solve the security and privacy problems in RFID systems. In this paper, we integrate public key encryption, embedded computation, and wireless communication technologies into the active RFID system that we proposed with cryptography and authentication mechanisms. In our proposed active RFID system, a secure RFID Tag intermittently transmits cipher text to a RFID Reader which then transmits in multi-hop relaying to a back-end platform to perform data comparison for authentication. In addition, the digital signature scheme – Tame Transformation Signatures (TTS) has the advantages of high security, high-speed key generation, signature, and suitability to embedded systems and is thus suitable to be used in our authentication system. It is used in our proposed system to protect the plain text. The TTS algorithm is from the family of asymmetric public key systems and thus has superiority such as better security, fast key generation, complex algorithm, and low signature delay. The TTS algorithm can thus encrypt data and perform authentication more effectively in active RFID systems. We have three major contributions in this paper. The first is to fully design and implement an active RFID system which includes active Tags and Readers. In our system, the Tag can stand by and keep working in long term after getting started. The second is to successfully implement a proposed active RFID system with TTS cryptography and authentication mechanisms to protect the content in tags to ensure the security in multi-hop transmission. The last is to adopt multi-hop relays to extend distance between Readers.
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملA Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system development further. In this paper, we propose a robust authentication protocol based on Elliptic Curve Cryptography (ECC), which meets the requirement of resource-limited RFID systems. Our protocol achieves mutual authentication and possesses lightweight feature by reducing th...
متن کاملA Secure and Efficient Authentication Protocol for Mobile RFID Systems
AbstrAct: The design of a secure communication scheme for Radio Frequency Identification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an RFID reader and its backend server is secure and concentrate on the security enhancemen...
متن کاملRFID Security Using Lightweight Mutual Authentication And Ownership Transfer Protocol
In recent years, radio frequency identification technology has moved into the mainstream applications that help to speed up handling of manufactured goods and materials. RFID tags are divided into two classes: active and passive. Active tag requires a power source that’s why its cost is more than passive tags. However, the low-cost RFID tags are facing new challenges to security and privacy. So...
متن کاملPassive Attacks on a Class of Authentication Protocols for RFID
Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent unauthorized tag tracking. In this paper, we analyze two mutual authentication protocols called MAP and EMAP, recently proposed by Peris-Lopez et. al. We show that a passive adversary eavesdropping on the open wireless medium, ca...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 26 شماره
صفحات -
تاریخ انتشار 2010