Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Novel Approach of Designing RFID Authentication Protocol based on Simple Symmetric Key (SSK) Algorithm


Affiliations
1 Department of Computer Networks and Engineering, College of Computer Science and Information Technology, Jazan University, Saudi Arabia
2 Department of Computer Science, College of Computer Science and Information Technology, Jazan University, Saudi Arabia
     

   Subscribe/Renew Journal


RFID uses radio frequency waves to transfer data using components such as tag, the reader and back-end server for device identification. Radio Frequency Identification technology (RFID) providing unique identification and tracking any device that has a tag attached to safeguard the products and protect from unauthorized users. There are many kinds of protocols to resolve these problems have been researched. Though, the security, cost, time and task of RFID are accountable to identify the feasible authentication protocol according to the business environment. In this research article, we proposed new authentication protocol as a method to protect privacy, especially for affordable cost and functionalities and have limited power consumption, memory and effective security process. The proposed protocol called as simple symmetric key (SSK) algorithm using random integers based on modulo 37. The proposed authentication protocol is secure against spoofing and replay attack and also it is suitable to support distributed database environment.

Keywords

RFID, Security, Symmetric Key Algorithm, Authentication, SSK, AES, DES.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Dang Nguyen Duc and Kwangjo Kim, “Defending RFID Authentication Protocols against DoS Attacks”, Computer Communications, Vol. 34, pp. 384-390, 2011.
  • Feng Zhu, Peng Li, He Xu and Ruchuan Wang, “A Lightweight RFID Mutual Authentication Protocol with PUF”, Sensors, Vol. 19, No. 13, pp. 1-13, 2019.
  • B. Song and C.J. Mitchell, “RFID Authentication Protocol for Low-Cost Tags”, Proceedings of 1st ACM Conference on Wireless Network Security, pp. 140-147, 2008.
  • S. Kardas, S. Celik, M. Sariyuce and A. Levi, “A Secure and Private RFID Authentication Protocol based on Quadratic Residue”, Proceedings of International Conference on Software, Telecommunications and Computer Networks, pp. 1-6, 2012.
  • Abdulhadi Alqarnia, Maali Alabdulhafitha and Srinivas Sampallia, “A Proposed RFID Authentication Protocol based on Two Stages of Authentication”, Proceedings of International Workshop on Privacy and Security in HealthCare, pp. 503-510, 2014.
  • R. Gadh, G. Roussos, K. Michael, G.Q. Huang, B.S. Prabhu and P. Chu, “RFID-A Unique Radio Innovation for the 21st Century”, Proceedings of the IEEE, Vol. 98, No. 9, pp. 1546-1549, 2010.
  • S. Karda, M.S. Kiraz, M.A. Bingol and H. Demirci, “A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions”, Proceedings of International Workshop on Radio Frequency Identification: Security and Privacy Issues, pp. 78–93, 2011.
  • E. Fernandes, A. Rahmati, J. Jung and A. Prakash, “Security Implications of Permission Models in Smart-Home Application Frameworks”, IEEE Security and Privacy, Vol. 15, No. 2, pp. 24-30, 2017.
  • P. Kumar, A. Braeken, A. Gurtov, J. Iinatti and P.H. Ha, “Anonymous Secure Framework in Connected Smart Home Environments”, IEEE Transactions on Information Forensics and Security, Vol. 12, No. 4, pp. 968-979, 2017.
  • P. Kumar, A. Gurtov, J. Iinatti, M. Ylianttila and M. Sain, “Lightweight and Secure Session Key Establishment Scheme in Smart Home Environments”, IEEE Sensors Journal, Vol. 16, No. 1, pp. 254-264, 2016.
  • Jian Shen, Chen Wang, Tong Li, Xiaofeng Chen, Xinyi Huang and Zhi-Hui Zhan, “Secure Data Uploading Scheme for a Smart Home System”, Information Sciences, Vol. 453, pp. 186-197, 2018.
  • X. Chen J Li, J. Weng, J. Ma and W. Lou, “Verifiable Computation over Large Database with Incremental Updates”, IEEE Transactions on Computers, Vol. 65, No. 10, pp. 3184-3195, 2016.
  • J. Li, Y. Zhang, X. Chen and Y. Xiang, “Secure Attribute-based Data Sharing for Resource-Limited users in Cloud Computing”, Computers and Security, Vol. 72, pp. 1-12, 2018.
  • J. Shen, C. Wang, A. Wang, Q. Liu and Y. Xiang, “Moving Centroid based Routing Protocol for Incompletely Predictable Cyber Devices in Cyber-Physical-Social Distributed Systems”, Future Generation Computer Systems, Vol. 45, No. 3, pp. 1-16, 2017.
  • J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun and Y. Xiang, “Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing”, IEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 6, pp. 996-1010, 2017.
  • Fuster Sabater, “Computation of Filtering Functions for Cryptographic Applications”, Proceedings of 14th International Conference on Computational Science, pp. 2013-2023, 2014.
  • J. Wang, X. Chen, J. Li, J. Zhao and J. Shen, “Towards Achieving Flexible and Verifiable Search for Outsourced Database in Cloud Computing”, Future Generation Computer Systems, Vol. 67, pp. 266-275, 2017.
  • N. Nagaraj, “One-Time Pad as a Nonlinear Dynamical System”, Communications in Nonlinear Science and Numerical Simulation, Vol. 17, No. 11, pp. 4029-4036, 2012.
  • C. Paar and J. Pelzl, “Understanding Cryptography”, Springer, 2010.
  • R.A. Rueppel, “Analysis and Design of Stream Ciphers”, Springer, 1986.
  • A.J. Menezes, “Handbook of Applied Cryptography”, CRC Press, 1997.
  • Jung Sik Cho, Sang Soo Yeo and Sung Kwon Kim, “Securing against Brute-Force Attack: A Hash-based RFID Mutual Authentication Protocol using a Secret Value”, Computer Communications, Vol. 34, No. 2, pp. 391-397, 2011.
  • K. Finkenzeller, “RFID Handbook”, 2nd Edition, Willey and Sons, 2002.
  • EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID, Available at: https://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf
  • Juels, “RFID Security and Privacy: A Research Survey”, Selected Areas in Communications, Vol. 24, No. 2, pp. 381-394, 2006.
  • Y. Yousuf and M. Vidyasagar, “A Survey of RFID Authentication Protocols”, Proceeding of 22nd International Conference on Advanced Information Networking and Applications, pp. 441-447, 2008.
  • Hung-Yu Chien, “SASI: A New Ultra lightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity”, IEEE Transactions on Dependable and Secure Computing, Vol. 4, No. 4, pp. 337-340, 2007
  • Anh Pham, “The Improvement of the Knapsack Cipher”, Computer Communications, Vol. 34, No. 3, pp. 342-343, 2011.
  • Prakash Kuppuswamy, Rashida Banu and Nithya Rekha, “Preventing and Securing Data From Cyber Crime using New Authentication Method Based On Block Cipher Scheme”, Proceedings of 2nd International Conference on Anti Cyber Crimes, pp. 113-117, 2017.
  • Prakash Kuppuswamy and Saeed Q.Y. Al-Khalidi, “Securing E-Commerce Business using Hybrid Combination based on New Symmetric Key and RSA Algorithm”, MIS Review, Vol. 20, No. 1, pp. 59-71, 2014.
  • Madiha Khalid, Umar Mujahid and Najam-Ul-Islam Muhammad, “Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags”, Security and Communication Networks, Vol. 2019, pp. 1-25, 2019.
  • H. Zhang, M.E.E Alahi, H. Ghayvat, S.C. Mukhopadhyay, Y.T. Zhang and W. Wu, “A Novel Secure IOT-based Smart Home Automation System using a Wireless Sensor Network”, Sensors, Vol. 17, No. 1, pp. 69-87, 2016.
  • S. Singh, P.K. Sharma and J.H. Park, “S.H. Secnet: An Enhanced Secure Network Architecture for the Diagnosis of Security Threats in a Smart Home”, Sustainability, Vol. 9, No. 4, pp. 513-531, 2017.
  • M. Wazid, A.K. Das, V. Odelu, N. Kumar and W. Susilo, “Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment”, IEEE Transactions on Dependable and Secure Computing, Vol. 14, No. 2, pp. 337-340, 2017.
  • Jong Sik Moon and Im-Yeong Lee, “An AAA Scheme using ID-Based Ticket with Anonymity in Future Mobile Communication”, Computer Communications, Vol. 34, No. 3, pp. 295-304, 2011.
  • S. Weis, S. Sarma, R. Rivest and D. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, Proceedings of International Conference on Security in Pervasive Computing, pp. 454-469, 2003.
  • Ming Huang Guo, Horng Twu Liaw, Der Jiunn Deng and Han Chieh Chao, “An RFID Secure Authentication Mechanism in WLAN”, Computer Communications, Vol. 34, No. 3, pp. 236-240, 2011.

Abstract Views: 354

PDF Views: 0




  • A Novel Approach of Designing RFID Authentication Protocol based on Simple Symmetric Key (SSK) Algorithm

Abstract Views: 354  |  PDF Views: 0

Authors

Prakash Kuppuswamy
Department of Computer Networks and Engineering, College of Computer Science and Information Technology, Jazan University, Saudi Arabia
Shanmugasundaram
Department of Computer Science, College of Computer Science and Information Technology, Jazan University, Saudi Arabia
Rajan John
Department of Computer Science, College of Computer Science and Information Technology, Jazan University, Saudi Arabia

Abstract


RFID uses radio frequency waves to transfer data using components such as tag, the reader and back-end server for device identification. Radio Frequency Identification technology (RFID) providing unique identification and tracking any device that has a tag attached to safeguard the products and protect from unauthorized users. There are many kinds of protocols to resolve these problems have been researched. Though, the security, cost, time and task of RFID are accountable to identify the feasible authentication protocol according to the business environment. In this research article, we proposed new authentication protocol as a method to protect privacy, especially for affordable cost and functionalities and have limited power consumption, memory and effective security process. The proposed protocol called as simple symmetric key (SSK) algorithm using random integers based on modulo 37. The proposed authentication protocol is secure against spoofing and replay attack and also it is suitable to support distributed database environment.

Keywords


RFID, Security, Symmetric Key Algorithm, Authentication, SSK, AES, DES.

References