Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Novel Approach of Designing RFID Authentication Protocol based on Simple Symmetric Key (SSK) Algorithm


Affiliations
1 Department of Computer Networks and Engineering, College of Computer Science and Information Technology, Jazan University, Saudi Arabia
2 Department of Computer Science, College of Computer Science and Information Technology, Jazan University, Saudi Arabia
     

   Subscribe/Renew Journal


RFID uses radio frequency waves to transfer data using components such as tag, the reader and back-end server for device identification. Radio Frequency Identification technology (RFID) providing unique identification and tracking any device that has a tag attached to safeguard the products and protect from unauthorized users. There are many kinds of protocols to resolve these problems have been researched. Though, the security, cost, time and task of RFID are accountable to identify the feasible authentication protocol according to the business environment. In this research article, we proposed new authentication protocol as a method to protect privacy, especially for affordable cost and functionalities and have limited power consumption, memory and effective security process. The proposed protocol called as simple symmetric key (SSK) algorithm using random integers based on modulo 37. The proposed authentication protocol is secure against spoofing and replay attack and also it is suitable to support distributed database environment.

Keywords

RFID, Security, Symmetric Key Algorithm, Authentication, SSK, AES, DES.
Subscription Login to verify subscription
User
Notifications
Font Size


  • A Novel Approach of Designing RFID Authentication Protocol based on Simple Symmetric Key (SSK) Algorithm

Abstract Views: 448  |  PDF Views: 0

Authors

Prakash Kuppuswamy
Department of Computer Networks and Engineering, College of Computer Science and Information Technology, Jazan University, Saudi Arabia
Shanmugasundaram
Department of Computer Science, College of Computer Science and Information Technology, Jazan University, Saudi Arabia
Rajan John
Department of Computer Science, College of Computer Science and Information Technology, Jazan University, Saudi Arabia

Abstract


RFID uses radio frequency waves to transfer data using components such as tag, the reader and back-end server for device identification. Radio Frequency Identification technology (RFID) providing unique identification and tracking any device that has a tag attached to safeguard the products and protect from unauthorized users. There are many kinds of protocols to resolve these problems have been researched. Though, the security, cost, time and task of RFID are accountable to identify the feasible authentication protocol according to the business environment. In this research article, we proposed new authentication protocol as a method to protect privacy, especially for affordable cost and functionalities and have limited power consumption, memory and effective security process. The proposed protocol called as simple symmetric key (SSK) algorithm using random integers based on modulo 37. The proposed authentication protocol is secure against spoofing and replay attack and also it is suitable to support distributed database environment.

Keywords


RFID, Security, Symmetric Key Algorithm, Authentication, SSK, AES, DES.

References