A Lightweight Memory-Based Protocol Authentication Using Radio Frequency Identification (RFID)

The maturity and stability of the widely used service paradigm have brought in a variety of benefits not only for software applications but also all kinds of connected devices. Web Services hide all kinds of device heterogeneities and complexities and present a homogeneous outlook for every kind of devices. Manufacturing machines, healthcare instruments, defence equipment, household utensils, appliances and wares, the growing array of consumer electronics, handhelds, we are able, and mobiles are being empowered to be computing, communicative, sensitive and responsive. Device services are enabling these connected devices to interact with one another in order to fulfil various business requirements. XML, JSON and other data formats come handy in formulating and transmitting data messages amongst all kinds of participating applications, devices, databases and services. In such kinds of extremely and deeply connected environments, the data security and privacy are being touted as the most challenging aspects. It should be noted that even security algorithms of steganography and cryptography provides us with the probability of 0.6 when it comes to protection in a service environment. Having understood the urgent need for technologically powerful solutions for unbreakable and impenetrable security, we have come out a security solution using the proven and promising RFID technology that has the power to reduce the probability of device-based attacks such as brute-force attack, dictionary attack and key-log-related attacks—which would make the device applications and services immune from malicious programmes.

[1]  Robert H. Deng,et al.  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  Pethuru Raj,et al.  The design and analysis of a hybrid attendance system leveraging a twofactor (2f) authentication (fingerprint-radio frequency identification) , 2016 .

[3]  Alexander Gluhak,et al.  A survey on facilities for experimental internet of things research , 2011, IEEE Communications Magazine.

[4]  Hyokyung Chang,et al.  User Authentication in Cloud Computing , 2011, UCMA.

[5]  Siu-Ming Yiu,et al.  SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment , 2012, ACNS.

[6]  J.R. Tuttle,et al.  Traditional and emerging technologies and applications in the radio frequency identification (RFID) industry , 1997, 1997 IEEE Radio Frequency Integrated Circuits (RFIC) Symposium. Digest of Technical Papers.

[7]  Sandra Dominikus,et al.  Passive RFID technology for the internet of things , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[8]  Ming Li,et al.  Storing Shared Data on the Cloud via Security-Mediator , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[9]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[10]  Carlisle M. Adams,et al.  Improving security and usability of low cost RFID tags , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.

[11]  Peter H. Cole,et al.  Synchronization of RFID readers for dense RFID reader environments , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).