RFID tag-based mutual authentication protocol with improved security for TMIS

被引:1
|
作者
Chander, Bhanu [1 ]
Gopalakrishnan, Kumaravelan [1 ]
机构
[1] Pondicherry Univ, Dept Comp Sci & Engn, Pondicherry 609605, India
关键词
radio frequency identification; RFID tag; telecare medicine information system; TMIS; authentication; security analysis; Scyther and AVISPA tools; GNY logic precision; SCHEME;
D O I
10.1504/IJICS.2022.125268
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the progressive and continuous development in micro-electro-mechanical technologies, intelligent internet of things (IoT), and the propagation of 5G communication technology, the security of resource-controlled IoT appliances like RFID-based TMIS applications has received predominant attention. Typically, wireless communication channel is utilised among tag, reader and back-end server, which is easily vulnerable to various intimidations such as spoofing, DoS, replay, and de-synchronisation. Therefore, the privacy and integrity of the communicated information cannot be guaranteed. Researchers proposed various symmetric and asymmetric encryptions, hash functions, key management, CRC, and ECC-based techniques for solving privacy and integrity issues of RFID authentication for TMIS systems. In the related work, we discussed up-to-date RFID-based authentication for TMIS systems. However, most do not solve formal, informal attacks; moreover, they suffer from communication and computational complexities. Thus, this manuscript describes an enhanced mutual authentication practice for RFID components with hash and random functions. We further demonstrate that the proposed scheme offers all the desired security requirements by verifying AVISPA, Scyther, and GNY logic.
引用
收藏
页码:383 / 405
页数:23
相关论文
共 50 条
  • [1] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Da-Zhi Sun
    Ji-Dong Zhong
    Wireless Personal Communications, 2016, 91 : 1085 - 1093
  • [2] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Sun, Da-Zhi
    Zhong, Ji-Dong
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1085 - 1093
  • [3] A quadratic residue-based RFID authentication protocol with enhanced security for TMIS
    Zhou, Zhiping
    Wang, Ping
    Li, Zhicong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) : 3603 - 3615
  • [4] A quadratic residue-based RFID authentication protocol with enhanced security for TMIS
    Zhiping Zhou
    Ping Wang
    Zhicong Li
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 3603 - 3615
  • [5] Mutual Authentication Security RFID Protocol Based on Time Stamp
    Zhang, Changlun
    Zhang, Wenqi
    Mu, Haibing
    2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 166 - 170
  • [6] Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag
    Yassine Naija
    Vincent Beroulle
    Mohsen Machhout
    Journal of Electronic Testing, 2018, 34 : 291 - 304
  • [7] Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag
    Naija, Yassine
    Beroulle, Vincent
    Machhout, Mohsen
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2018, 34 (03): : 291 - 304
  • [8] Mutual Authentication Protocol for RFID Security using NFSR
    Suresh, T.
    Ramakrishnan, M.
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259
  • [9] A RFID Mutual Authentication Security Protocol Design and Analysis
    Liang, Xiaobing
    Lv, Yingjie
    Zhao, Bing
    Liu, Ying
    Sun, Zhiqiang
    Cen, Wei
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512
  • [10] Security Analysis of a Mutual Authentication Protocol for RFID Systems
    Yang, Yuanyuan
    Lu, Zhen
    Chen, Zhuo
    Wei, Xiang
    Gu, Jian
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255