RFID Mutual Authentication Protocols based on Gene Mutation and Transfer

Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to...

Full description

Bibliographic Details
Main Authors: Raghav V. Sampangi, Srinivas Sampalli
Format: Article
Language:English
Published: Croatian Communications and Information Society (CCIS) 2013-03-01
Series:Journal of Communications Software and Systems
Subjects:
Online Access:https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/157
id doaj-072b96bb87864ea98d5247558db7971b
record_format Article
spelling doaj-072b96bb87864ea98d5247558db7971b2020-11-24T22:23:03ZengCroatian Communications and Information Society (CCIS)Journal of Communications Software and Systems1845-64211846-60792013-03-01914456RFID Mutual Authentication Protocols based on Gene Mutation and TransferRaghav V. SampangiSrinivas SampalliRadio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis. https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/157RFID securityRFID authenticationmutual authenticationgenetic mutationencryption key generation and management
collection DOAJ
language English
format Article
sources DOAJ
author Raghav V. Sampangi
Srinivas Sampalli
spellingShingle Raghav V. Sampangi
Srinivas Sampalli
RFID Mutual Authentication Protocols based on Gene Mutation and Transfer
Journal of Communications Software and Systems
RFID security
RFID authentication
mutual authentication
genetic mutation
encryption key generation and management
author_facet Raghav V. Sampangi
Srinivas Sampalli
author_sort Raghav V. Sampangi
title RFID Mutual Authentication Protocols based on Gene Mutation and Transfer
title_short RFID Mutual Authentication Protocols based on Gene Mutation and Transfer
title_full RFID Mutual Authentication Protocols based on Gene Mutation and Transfer
title_fullStr RFID Mutual Authentication Protocols based on Gene Mutation and Transfer
title_full_unstemmed RFID Mutual Authentication Protocols based on Gene Mutation and Transfer
title_sort rfid mutual authentication protocols based on gene mutation and transfer
publisher Croatian Communications and Information Society (CCIS)
series Journal of Communications Software and Systems
issn 1845-6421
1846-6079
publishDate 2013-03-01
description Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis.
topic RFID security
RFID authentication
mutual authentication
genetic mutation
encryption key generation and management
url https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/157
work_keys_str_mv AT raghavvsampangi rfidmutualauthenticationprotocolsbasedongenemutationandtransfer
AT srinivassampalli rfidmutualauthenticationprotocolsbasedongenemutationandtransfer
_version_ 1725766171952676864