Abstract
Nowadays, the Internet of Things is significantly used in the world of information technology. One of the most important things for the Internet of Things is RFID tags that send information out of the environment. Forasmuch as the security process is important, the network authentication should be done with great accuracy. In this study, we propose a cryptographic authentication method that can increase the security of Internet of Things against various attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, S., Chen, G., Zhou, Y., Li, J.: Enhanced-Bivium algorithm for RFID system. Math. Probl. Eng. 2015(616182), 6 (2015). https://doi.org/10.1155/2015/616182
Alizadeh, M., Zamani, M., Shahemabadi, A.R., Shayan, J., Azanik, A.: A survey on attacks in RFID networks. Open Int. J. Inform. 1(1) (2013)
Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classifying RFID attacks and defenses. Inf. Syst. Front. 12(5) (2010)
Khedr, W.I.: SRFID: a hash-based security scheme for low cost RFID systems. Egypt. Inform. J. 14(1) 2013
Cho, J.S., Yeo, S.S., Kim S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3) (2011)
Moosavi, S.R., Nigussie, E., Virtanen, S., Isoaho, J.: An elliptic curve-based mutual authentication scheme for RFID implant systems. Procedia Comput. Sci. 32, 198–206 (2014)
Farash, M.S.: Cryptoanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. (2014)
He, D., Kumar, N., Chilamkurti, N., Lee, J.H.: Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38, 1–6 (2014)
Liu, Z., Liu, D., Li, L., Lin, H., Yong, Z.: Implementation of a new RFID authentication protocol for EPC Gen2 standard. IEEE Sens. J. 15(2) (2015)
Khatwani, C., Roy, S.: Security analysis of ECC based authentication protocols. In: Proceedings of the 2015 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 1167–1172. Jabalpur, India, 12–14 December 2015
Liu, D., Liu, Z., Yong, Z., Zou, X., Cheng, J.: Design and implementation of an ECC-based digital baseband controller for RFID tag chip. IEEE Trans. Ind. Electron. 62(7) (2015)
Benssalah, M., Djeddou, M.: Design and Implementation of a New Active RFID Authentication Protocol Based on Elliptic Curve Encryption, SAI Computing Conference 2016, London, UK, 13–15 July 2016
Chuang, Y.H., Hsu, C.L., Shu, W., Hsu, K.C., Liao, M.W.: A Secure Non-interactive Deniable AuthenticationProtocol with Certificates Based on Elliptic Curve Cryptography. New Trends in Intelligent Information and Database Systems, pp. 183–190. Springer, Berlin (2015)
Jin, C., Xu, C., Zhang, X., Zhao, J.: A secure RFID mutual authentication protocol for healthcare nvironments using elliptic curve cryptography. J. Med. Syst. 39, 1–8 (2015)
Ye, N., Zhu, Y., Wang, R.C., Malekian, R., Min, L.Q.: An efficient authentication and access control scheme for perception layer of internet of things. Int. J. Appl. Math. Inf. Sci. 8, 1617–1624 (2014)
Mahalle, P.N., Prasad, N.R., Prasad, R.: Object classification based context management for identity management in internet of things. Int. J. Comput. Appl. 63, 1–6 (2013)
Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266–2279 (2013)
Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., and Kikiras, P.: On the Security and Privacy of Internet of Things Architectures and Systems, In: International Workshop on Secure Interner of Things(SIOT) 2015
Gope, P., Hwang, T.: A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput. Secur. 55, 271–280 (2015)
Gope, P., Hwang, T.: Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel. Pers. Commun. 82, 2231–2245 (2015)
Ghanbari, S., Othman, M., Abu Bakar, M.R., Leong, W.J.: Multi-objective method for divisible load scheduling in multi-level tree network. Future Gener. Comput. Syst. 54, 132–143 (2016)
Ghanbari, S., Othman, M.: A priority based job scheduling algorithm in cloud computing. Procedia Eng. 50, 778–785 (2012)
Sharaf-Dabbagh, Y., Walid, S.: On the authentication of devices in the Internet of things. In: IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2016, pp. 1–3. IEEE, 2016
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Asadpour, F., Ghanbari, S. (2018). Presenting a New Method of Authentication for the Internet of Things Based on RFID. In: Ghazali, R., Deris, M., Nawi, N., Abawajy, J. (eds) Recent Advances on Soft Computing and Data Mining. SCDM 2018. Advances in Intelligent Systems and Computing, vol 700. Springer, Cham. https://doi.org/10.1007/978-3-319-72550-5_48
Download citation
DOI: https://doi.org/10.1007/978-3-319-72550-5_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72549-9
Online ISBN: 978-3-319-72550-5
eBook Packages: EngineeringEngineering (R0)