Abstract

With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures, iris scanners, etc., to infer the environmental status. These devices are generally identified using radio-frequency identification (RFID) to transfer the collected data to other local or remote objects over a geographical location. To enable automatic data collection and transition, a valid RFID embedded object is highly recommended. It is used to authorize the devices at various communication phases. In smart application devices, RFID-based authentication is enabled to provide short-range operation. On the other hand, it does not require the communication device to be in line-of-sight to gain server access like bar-code systems. However, in existing authentication schemes, an adversary may capture private user data to create a forgery problem. Also, another issue is the high computation cost. Thus, several studies have addressed the usage of context-aware authentication schemes for multimedia device management systems. The security objective is to determine the user authenticity in order to withhold the eavesdropping and tracing. Lately, RFID has played a significant for the context-aware sensor management systems (CASMS) as it can reduce the complexity of the sensor systems, it can be available in access control, sensor monitoring, real time inventory and security-aware management systems. Lately, this technology has opened up its wings for CASMS, where the challenging issues are tag-anonymity, mutual authentication and untraceability. Thus, this paper proposes a secure hash-based RFID mechanism for CASMS. This proposed protocol is based on the hash operation with the synchronized secret session-key to withstand any attacks, such as desynchronization, replay and man-in-the-middle. Importantly, the security and performance analysis proves that the proposed hash-based protocol achieves better security and performance efficiencies than other related schemes. From the simulation results, it is observed that the proposed scheme is secure, robust and less expensive while achieving better communication metrics such as packet delivery ratio, end-to-end delay and throughput rate.

Highlights

  • In the recent past, the development of smart computing devices in the Internet of Things (IoT) has grown exponentially [1,2]

  • radio frequency identification (RFID) has played a significant for the context-aware sensor management systems (CASMS) as it can reduce the complexity of the sensor systems, it can be available in access control, sensor monitoring, real time inventory and security-aware management systems

  • RFID authentication haspresented been presented as a novel approach controllingthe thephysical physical access

Read more

Summary

Introduction

The development of smart computing devices in the Internet of Things (IoT) has grown exponentially [1,2]. The technology known as Radio Frequency Identification (RFID) reads the physical objects and automatically recognizes the relative object details, i.e., it is basically a non-contract recognition technique [5] This technique uses some type of artificial inference to sense the radio frequency that provides a communication between the tags attaching with the objects and the readers connecting with the backend server systems. The countries like Japan, USA and other developing countries are nowadays becoming equipped with advanced RFID systems [6] It has undergone further advancement in the form of electric induction [7] that recognizes the tag attachment object to read the object information. The computation power of programmable smartcards has increased tremendously for the massive development of smart electronic devices such as public transportation, e-passports, e-ticketing and e-identification These RFID-based communication devices are expected to provide tag anonymity in order to ensure privacy enhancement.

System Communication Model
Research Motivation
Enabling Technologies and Its Key Objectives
Context-Aware
Novel Hash-Based RFID Mutual Authentication Protocol
Phase I
Phase II
Phase III
H IDK k Ri k Rj
Phase IV
Security and Efficiency Analysis
BAN Logic Analysis
H IDk k Ri k Rj
Informal Analysis
H IDK k Ri k Rj k
Performance Analysis
Experimental Study
Throughput
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call