RFID tag-based mutual authentication protocol with improved security for TMIS

被引:1
|
作者
Chander, Bhanu [1 ]
Gopalakrishnan, Kumaravelan [1 ]
机构
[1] Pondicherry Univ, Dept Comp Sci & Engn, Pondicherry 609605, India
关键词
radio frequency identification; RFID tag; telecare medicine information system; TMIS; authentication; security analysis; Scyther and AVISPA tools; GNY logic precision; SCHEME;
D O I
10.1504/IJICS.2022.125268
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the progressive and continuous development in micro-electro-mechanical technologies, intelligent internet of things (IoT), and the propagation of 5G communication technology, the security of resource-controlled IoT appliances like RFID-based TMIS applications has received predominant attention. Typically, wireless communication channel is utilised among tag, reader and back-end server, which is easily vulnerable to various intimidations such as spoofing, DoS, replay, and de-synchronisation. Therefore, the privacy and integrity of the communicated information cannot be guaranteed. Researchers proposed various symmetric and asymmetric encryptions, hash functions, key management, CRC, and ECC-based techniques for solving privacy and integrity issues of RFID authentication for TMIS systems. In the related work, we discussed up-to-date RFID-based authentication for TMIS systems. However, most do not solve formal, informal attacks; moreover, they suffer from communication and computational complexities. Thus, this manuscript describes an enhanced mutual authentication practice for RFID components with hash and random functions. We further demonstrate that the proposed scheme offers all the desired security requirements by verifying AVISPA, Scyther, and GNY logic.
引用
收藏
页码:383 / 405
页数:23
相关论文
共 50 条
  • [21] Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems
    Wang, Siye
    Zhu, Shaoyi
    Zhang, Yanfang
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 74 - 77
  • [22] Mutual Authentication Protocol for RFID based on ECC
    Zheng, Lijuan
    Xue, Yujuan
    Zhang, Linhao
    Zhang, Rui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 320 - 323
  • [23] A Mutual Authentication Protocol for RFID
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-hao
    IT PROFESSIONAL, 2011, 13 (02) : 20 - 24
  • [24] MUTUAL AUTHENTICATION PROTOCOL BASED ON TAG ID NUMBER UPDATING FOR LOW-COST RFID
    Gu, Yonghao
    Wu, Weiming
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 548 - 551
  • [25] Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
    Safkhani, Masoumeh
    Pens-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Bagheri, Nasour
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 571 - 577
  • [26] Hardware implementation of tag-reader mutual authentication protocol for RFID systems
    Vijaykumar, V. R.
    Elango, S.
    INTEGRATION-THE VLSI JOURNAL, 2014, 47 (01) : 123 - 129
  • [27] Mutual Authentication of RFID Tag with Multiple Readers
    Piramuthu, Selwyn
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 357 - 361
  • [28] On RFID Privacy with Mutual Authentication and Tag Corruption
    Armknecht, Frederik
    Sadeghi, Ahmad-Reza
    Visconti, Ivan
    Wachsmann, Christian
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 493 - +
  • [29] An improved mutual authentication scheme for EPC Gen2 RFID tag
    Xuan, Xiuwei
    Li, Kun
    Cao, Yang
    ICIC Express Letters, 2015, 9 (08): : 2119 - 2124
  • [30] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114