Abstract

Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges in the constrained nature of RFID applications by applying a light-weight cryptographic method with advanced-level 128 bit security protection. Thus, IMAKA-Tate protects the RFID system from various security and privacy threats (e.g. unauthorized tracking, cloning attack, etc.).

Highlights

  • Introduction & MotivationThe emerging of sensor integration to RFID system called smart RFID has recently attracted a lot of interest in research and development

  • Smart RFID tag is basically a device with limited resources in term of CPU, memory, bandwidth/data-rate, and energy/battery storage. Such limitations make the smart RFID tag is highly susceptible to various threats that are common in Wireless Sensor Network (WSN)

  • In order to achieve efficient and flexible communication that can be used for large-scale RFID system, IMAKA-Tate transports the authentication messages through standard Extensible Authentication Protocol (EAP) method as described in (RFC 3748) [12]

Read more

Summary

Introduction & Motivation

The emerging of sensor integration to RFID system called smart RFID has recently attracted a lot of interest in research and development. Smart RFID tag is basically a device with limited resources in term of CPU, memory, bandwidth/data-rate, and energy/battery storage. Such limitations make the smart RFID tag is highly susceptible to various threats that are common in WSN. TLS/SSL suffers from various problems reaching from various security threats (e.g. MITM attacks), to communication and computation overheads that would overburden the limited capabilities of smart RFID system. This paper presents IMAKA-Tate, a light-weight identity protection and mutual authentication using. Tate method is tailored to tackle the specific challenges for security and privacy in the constrained nature of smart RFID.

Related Work
Preliminaries
Setup Phase
Authentication and Key Negotiation Phase
Mutual Authentication over EAP
Initiation request
EAP Response IBE Challenge
EAP Success
EAP IMAKA-Tate Message Format
Attacks from RFID Reader Side
Privacy Issue and Attacks from RFID Tag
Security Features
Computation Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call