Abstract

With the progressive and continuous development in micro-electro-mechanical technologies, intelligent internet of things (IoT), and the propagation of 5G communication technology, the security of resource-controlled IoT appliances like RFID-based TMIS applications has received predominant attention. Typically, wireless communication channel is utilised among tag, reader and back-end server, which is easily vulnerable to various intimidations such as spoofing, DoS, replay, and de-synchronisation. Therefore, the privacy and integrity of the communicated information cannot be guaranteed. Researchers proposed various symmetric and asymmetric encryptions, hash functions, key management, CRC, and ECC-based techniques for solving privacy and integrity issues of RFID authentication for TMIS systems. In the related work, we discussed up-to-date RFID-based authentication for TMIS systems. However, most do not solve formal, informal attacks; moreover, they suffer from communication and computational complexities. Thus, this manuscript describes an enhanced mutual authentication practice for RFID components with hash and random functions. We further demonstrate that the proposed scheme offers all the desired security requirements by verifying AVISPA, Scyther, and GNY logic.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call