Advertisement

Presenting a New Method of Authentication for the Internet of Things Based on RFID

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 700)

Abstract

Nowadays, the Internet of Things is significantly used in the world of information technology. One of the most important things for the Internet of Things is RFID tags that send information out of the environment. Forasmuch as the security process is important, the network authentication should be done with great accuracy. In this study, we propose a cryptographic authentication method that can increase the security of Internet of Things against various attacks.

Keywords

RFID Internet of things Authentication 

References

  1. 1.
    Zhang, S., Chen, G., Zhou, Y., Li, J.: Enhanced-Bivium algorithm for RFID system. Math. Probl. Eng. 2015(616182), 6 (2015).  https://doi.org/10.1155/2015/616182
  2. 2.
    Alizadeh, M., Zamani, M., Shahemabadi, A.R., Shayan, J., Azanik, A.: A survey on attacks in RFID networks. Open Int. J. Inform. 1(1) (2013)Google Scholar
  3. 3.
    Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classifying RFID attacks and defenses. Inf. Syst. Front. 12(5) (2010)Google Scholar
  4. 4.
    Khedr, W.I.: SRFID: a hash-based security scheme for low cost RFID systems. Egypt. Inform. J. 14(1) 2013Google Scholar
  5. 5.
    Cho, J.S., Yeo, S.S., Kim S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3) (2011)Google Scholar
  6. 6.
    Moosavi, S.R., Nigussie, E., Virtanen, S., Isoaho, J.: An elliptic curve-based mutual authentication scheme for RFID implant systems. Procedia Comput. Sci. 32, 198–206 (2014)CrossRefGoogle Scholar
  7. 7.
    Farash, M.S.: Cryptoanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. (2014)Google Scholar
  8. 8.
    He, D., Kumar, N., Chilamkurti, N., Lee, J.H.: Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38, 1–6 (2014)CrossRefGoogle Scholar
  9. 9.
    Liu, Z., Liu, D., Li, L., Lin, H., Yong, Z.: Implementation of a new RFID authentication protocol for EPC Gen2 standard. IEEE Sens. J. 15(2) (2015)Google Scholar
  10. 10.
    Khatwani, C., Roy, S.: Security analysis of ECC based authentication protocols. In: Proceedings of the 2015 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 1167–1172. Jabalpur, India, 12–14 December 2015Google Scholar
  11. 11.
    Liu, D., Liu, Z., Yong, Z., Zou, X., Cheng, J.: Design and implementation of an ECC-based digital baseband controller for RFID tag chip. IEEE Trans. Ind. Electron. 62(7) (2015)Google Scholar
  12. 12.
    Benssalah, M., Djeddou, M.: Design and Implementation of a New Active RFID Authentication Protocol Based on Elliptic Curve Encryption, SAI Computing Conference 2016, London, UK, 13–15 July 2016Google Scholar
  13. 13.
    Chuang, Y.H., Hsu, C.L., Shu, W., Hsu, K.C., Liao, M.W.: A Secure Non-interactive Deniable AuthenticationProtocol with Certificates Based on Elliptic Curve Cryptography. New Trends in Intelligent Information and Database Systems, pp. 183–190. Springer, Berlin (2015)Google Scholar
  14. 14.
    Jin, C., Xu, C., Zhang, X., Zhao, J.: A secure RFID mutual authentication protocol for healthcare nvironments using elliptic curve cryptography. J. Med. Syst. 39, 1–8 (2015)CrossRefGoogle Scholar
  15. 15.
    Ye, N., Zhu, Y., Wang, R.C., Malekian, R., Min, L.Q.: An efficient authentication and access control scheme for perception layer of internet of things. Int. J. Appl. Math. Inf. Sci. 8, 1617–1624 (2014)CrossRefGoogle Scholar
  16. 16.
    Mahalle, P.N., Prasad, N.R., Prasad, R.: Object classification based context management for identity management in internet of things. Int. J. Comput. Appl. 63, 1–6 (2013)Google Scholar
  17. 17.
    Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266–2279 (2013)CrossRefGoogle Scholar
  18. 18.
    Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., and Kikiras, P.: On the Security and Privacy of Internet of Things Architectures and Systems, In: International Workshop on Secure Interner of Things(SIOT) 2015Google Scholar
  19. 19.
    Gope, P., Hwang, T.: A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput. Secur. 55, 271–280 (2015)CrossRefGoogle Scholar
  20. 20.
    Gope, P., Hwang, T.: Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel. Pers. Commun. 82, 2231–2245 (2015)CrossRefGoogle Scholar
  21. 21.
    Ghanbari, S., Othman, M., Abu Bakar, M.R., Leong, W.J.: Multi-objective method for divisible load scheduling in multi-level tree network. Future Gener. Comput. Syst. 54, 132–143 (2016)CrossRefGoogle Scholar
  22. 22.
    Ghanbari, S., Othman, M.: A priority based job scheduling algorithm in cloud computing. Procedia Eng. 50, 778–785 (2012)CrossRefGoogle Scholar
  23. 23.
    Sharaf-Dabbagh, Y., Walid, S.: On the authentication of devices in the Internet of things. In: IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2016, pp. 1–3. IEEE, 2016Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Department of Computer ScienceIslamic Azad UniversityAshtian BranchIran
  2. 2.Iranian Non-profit Association of Distributed Computing and SytemsQomIran

Personalised recommendations