Multilevel Secure RFID Based Object Tracking System

Security is an important issue in our everyday life. System based on different wireless protocol standards is vulnerable to security threats. This Paper is giving glance on security issues arises in object tracking system; and to deal with that, provide comparative analysis between various cryptographic techniques for selecting best one among all. The use of 128 bit PRNG and XOR protocol across RFID system and applying Binary ECC while sending data via GSM communication will surely boost up safety measures of object tracking system as depicted in this paper.

[1]  S. Goswami,et al.  Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm , 2012, 2012 Third International Conference on Intelligent Systems Modelling and Simulation.

[2]  Martin Feldhofer,et al.  A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.

[3]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[4]  Hung-Yu Chien,et al.  ECC-based lightweight authentication protocol with untraceability for low-cost RFID , 2009, J. Parallel Distributed Comput..

[5]  Roberto Di Pietro,et al.  An optimal probabilistic solution for information confinement, privacy, and security in RFID systems , 2011, J. Netw. Comput. Appl..

[6]  Yong Guan,et al.  Lightweight Secure Search Protocols for Low-cost RFID Systems , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[7]  Kwangjo Kim,et al.  Defending RFID authentication protocols against DoS attacks , 2011, Comput. Commun..

[8]  Do-Hyeun Kim,et al.  Animal Situation Tracking Service Using RFID, GPS, and Sensors , 2010, 2010 Second International Conference on Computer and Network Technology.

[9]  Leonid Bolotnyy,et al.  Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[10]  Ingrid Verbauwhede,et al.  Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.

[11]  Wanlei Zhou,et al.  A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems , 2013, Ad Hoc Networks.

[12]  Wanlei Zhou,et al.  Secure ownership transfer in multi-tag/multi-owner passive RFID systems , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[13]  Hangrok Lee,et al.  The Tag Authentication Scheme using Self-Shrinking Generator on RFID System , 2008 .

[14]  Mark J. Clement,et al.  Performance of finite field arithmetic in an elliptic curve cryptosystem , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[15]  Sonali Nimbhorkar Prospective Utilization of Elliptic Curve Cryptography for Security Enhancement , 2013 .

[16]  Julio César Hernández Castro,et al.  Flaws on RFID grouping-proofs. Guidelines for future sound protocols , 2011, J. Netw. Comput. Appl..

[17]  Turki F. Al-Somani,et al.  Comparative Study of Elliptic Curve Cryptography Hardware Implementations in Wireless Sensor Networks , 2013 .

[18]  Saad Islam,et al.  Developing and implementing encryption algorithm for addressing GSM security issues , 2009, 2009 International Conference on Emerging Technologies.

[19]  Kinjal Mehta,et al.  A Survey on Elliptic Curve Cryptography , 2015 .

[20]  Tim Kerins,et al.  An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..

[21]  Ankush Vishwanath,et al.  RFID and GSM Based Three Level Security System , 2013, 2013 Texas Instruments India Educators' Conference.

[22]  Yu-Jung Huang,et al.  Hardware Implementation of RFID Mutual Authentication Protocol , 2010, IEEE Transactions on Industrial Electronics.

[23]  Mesud Hadzialic,et al.  An approach to analyze security of GSM network , 2014, 2014 22nd Telecommunications Forum Telfor (TELFOR).

[24]  Wanlei Zhou,et al.  Secure Tag Search in RFID Systems Using Mobile Readers , 2015, IEEE Transactions on Dependable and Secure Computing.

[25]  Erich Wenger,et al.  Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations , 2011, NordSec.