RFID Mutual Authentication Protocols based on Gene Mutation and Transfer
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Croatian Communications and Information Society (CCIS)
2013-03-01
|
Series: | Journal of Communications Software and Systems |
Subjects: | |
Online Access: | https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/157 |
id |
doaj-072b96bb87864ea98d5247558db7971b |
---|---|
record_format |
Article |
spelling |
doaj-072b96bb87864ea98d5247558db7971b2020-11-24T22:23:03ZengCroatian Communications and Information Society (CCIS)Journal of Communications Software and Systems1845-64211846-60792013-03-01914456RFID Mutual Authentication Protocols based on Gene Mutation and TransferRaghav V. SampangiSrinivas SampalliRadio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis. https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/157RFID securityRFID authenticationmutual authenticationgenetic mutationencryption key generation and management |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Raghav V. Sampangi Srinivas Sampalli |
spellingShingle |
Raghav V. Sampangi Srinivas Sampalli RFID Mutual Authentication Protocols based on Gene Mutation and Transfer Journal of Communications Software and Systems RFID security RFID authentication mutual authentication genetic mutation encryption key generation and management |
author_facet |
Raghav V. Sampangi Srinivas Sampalli |
author_sort |
Raghav V. Sampangi |
title |
RFID Mutual Authentication Protocols based on Gene Mutation and Transfer |
title_short |
RFID Mutual Authentication Protocols based on Gene Mutation and Transfer |
title_full |
RFID Mutual Authentication Protocols based on Gene Mutation and Transfer |
title_fullStr |
RFID Mutual Authentication Protocols based on Gene Mutation and Transfer |
title_full_unstemmed |
RFID Mutual Authentication Protocols based on Gene Mutation and Transfer |
title_sort |
rfid mutual authentication protocols based on gene mutation and transfer |
publisher |
Croatian Communications and Information Society (CCIS) |
series |
Journal of Communications Software and Systems |
issn |
1845-6421 1846-6079 |
publishDate |
2013-03-01 |
description |
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis.
|
topic |
RFID security RFID authentication mutual authentication genetic mutation encryption key generation and management |
url |
https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/157 |
work_keys_str_mv |
AT raghavvsampangi rfidmutualauthenticationprotocolsbasedongenemutationandtransfer AT srinivassampalli rfidmutualauthenticationprotocolsbasedongenemutationandtransfer |
_version_ |
1725766171952676864 |