A Novel Approach for Authentication of RFID Devices

Authors

  • Suthar Monali  IT Department, LDCE, Ahmedabad, Gujarat, India
  • Prof. Alka J Patel   IT Department, LDCE, Ahmedabad, Gujarat, India

Keywords:

RFID, Reader, Tag, Backend Sever , Authentication , Security , ECC.

Abstract

RFID is a wireless technology for automatic identification and data capture and it’s the core technology to implement the internet of things. Because of that, the security issue of RFID is becoming more important. In past , simple mathematical and logical method, hash based schemas and simple PKI schemas are introduce RFID authentication . In this paper we illustrate about the possible security attack on RFID and introduce a novel approach using pre computing function and also discuss security analysis.

References

  1. Xiao Nie, Xiong Zhong “Security In the Internet of Things Based on RFID: Issues and Current Countermeasures” Proceedings of the Published by Atlantis Press, Paris, France.
  2. Seung Wook Jung , Souhwan Jung ” HRP : A HMAC-based RFID mutual authentication protocol using PUF” , ICOIN 2013, IEEE publication , pp 578-582.
  3. Boyeon Song , Chris J Mitchell ” RFID AuthenticationProtocolfor Low-cost Tags” WiSec’08, March 31–April 2,2008,Alexandria, Virginia, USA
  4. Yi-Pin Liao , Chih-Ming Hsiao “A secure ECC-based RFID authentication scheme integrated with ID-veri?er transfer protocol ” Department of computer science and information engineering , St.John’s university,Taipei,ROC (2013), published by ELSEVIER, http://dx.doi.org/10.1016/j.adhoc.2013.02.004
  5. Mohammad Sabzinejad Farash ” Cryptanalysis and improvement of an ef?cient mutual authentication RFID scheme based on elliptic curve cryptograph” published by Springer Science+Business Media New York 2014, DOI: 10.1007/s11227-014-1272-0
  6. C.P. Schnorr,” Ef?cient identi?cation and signatures for smart cards”, in: Gilles Brassard (Ed.), Advances in Cryptology – CRYPTO’89, Lecture Notes in Computer Science, 435, Springer-Verlag, 1989, pp. 239–252.
  7. ChouJS(2013)” An ef?cient mutual authentication RFID scheme based on elliptic curve cryptography” .J Supercomput. doi:10.1007/s11227-013-1073-x
  8. Gy6z6 Godor, Norbert Giczi, Sandor Imre Dr.“Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems -Performance Analysis by Simulations”, Department of Telecommunications, Budapest University of Technology and Economics Magyar Tud6sok korutja 2., Budapest, Hungary H-ll17, 978-1-4244-5849-3/10/$26.00 ©2010 IEEE

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Suthar Monali, Prof. Alka J Patel , " A Novel Approach for Authentication of RFID Devices, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.1095-1098, March-April-2018.