Abstract
Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges in the constrained nature of RFID applications by applying a light-weight cryptographic method with advanced-level 128 bit security protection. Thus, IMAKA-Tate protects the RFID system from various security and privacy threats (e.g. unauthorized tracking, cloning attack, etc.).
Highlights
Introduction & MotivationThe emerging of sensor integration to RFID system called smart RFID has recently attracted a lot of interest in research and development
Smart RFID tag is basically a device with limited resources in term of CPU, memory, bandwidth/data-rate, and energy/battery storage. Such limitations make the smart RFID tag is highly susceptible to various threats that are common in Wireless Sensor Network (WSN)
In order to achieve efficient and flexible communication that can be used for large-scale RFID system, IMAKA-Tate transports the authentication messages through standard Extensible Authentication Protocol (EAP) method as described in (RFC 3748) [12]
Summary
The emerging of sensor integration to RFID system called smart RFID has recently attracted a lot of interest in research and development. Smart RFID tag is basically a device with limited resources in term of CPU, memory, bandwidth/data-rate, and energy/battery storage. Such limitations make the smart RFID tag is highly susceptible to various threats that are common in WSN. TLS/SSL suffers from various problems reaching from various security threats (e.g. MITM attacks), to communication and computation overheads that would overburden the limited capabilities of smart RFID system. This paper presents IMAKA-Tate, a light-weight identity protection and mutual authentication using. Tate method is tailored to tackle the specific challenges for security and privacy in the constrained nature of smart RFID.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have