Efficient and Timely Mutual Authentication Scheme for RFID Systems

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks which limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems. Keywords---RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature.

[1]  Christof Paar,et al.  A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.

[2]  Jian Shen,et al.  A Novel Anonymous RFID Authentication Protocol Providing Strong Privacy and Security , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[3]  Liangmin Wang,et al.  Rapid Identification Authentication Protocol for Mobile Nodes in Internet of Things with Privacy Protection , 2012, J. Networks.

[4]  Ingrid Verbauwhede,et al.  Low-cost untraceable authentication protocols for RFID , 2010, WiSec '10.

[5]  Soo-Young Kang,et al.  A study on secure RFID mutual authentication scheme in pervasive computing environment , 2008, Comput. Commun..

[6]  Antonio F. Skarmeta,et al.  A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[7]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[8]  Srinivas Sampalli,et al.  Technique for preventing DoS attacks on RFID systems , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.

[9]  Alex X. Liu,et al.  PAP: A privacy and authentication protocol for passive RFID tags , 2009, Comput. Commun..

[10]  Sangjin Kim,et al.  A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection , 2008, ISPEC.

[11]  Young-Jae Park,et al.  Accelerating RFID Tag Identification Processes with Frame Size Constraint Relaxation , 2012, J. Inform. and Commun. Convergence Engineering.

[12]  Yun Tian,et al.  A New Ultralightweight RFID Authentication Protocol with Permutation , 2012, IEEE Communications Letters.

[13]  Ron Weinstein,et al.  RFID: a technical overview and its application to the enterprise , 2005, IT Professional.

[14]  Lakhmi C. Jain,et al.  Advances in Intelligent Systems and Applications - Volume 1 , 2012 .

[15]  Kee-Young Yoo,et al.  Efficient and Secure Password Authentication Schemes for Low-Power Devices , 2005, MSN.