عنوان المقالة:A SURVEY OF RFID AUTHENTICATION PROTOCOLS A SURVEY OF RFID AUTHENTICATION PROTOCOLS
ا.د. محمد عصام يونس | Mohammed I. Younis | 13805
- نوع النشر
- مجلة علمية
- المؤلفون بالعربي
- محمد عصام يونس , مصطفى هاشم عبد الكريم
- المؤلفون بالإنجليزي
- Mohammed Issam Younis, Mustafa Hashim Abdulkareem
- الملخص العربي
- Security and privacy are significant issues in radio frequency identification (RFID) systems. There are many RFID authentication protocols have been proposed to address those issues. Some of these protocols employ way hashing function as a mechanism for addressing security and privacy issues of RFID systems, other protocols employ random number generator (RNG) and simple functions like cyclic redundancy code (CRC) functions as a mechanism for solving security and privacy problems and some proposals employ simple bitwise operations (e.g. XOR, AND, OR) for enhancing security and privacy of RFID systems. Although the proposed protocols have the capability to supply particular solution for RFID security and privacy issues, they cannot supply integrated solution. This paper is a survey to closely study those protocols in terms of their focus and limitations. In doing so, the security and privacy requirements are identified. Moreover, based on these requirements; 28 Secure RFID-based systems are discussed and compared in a form of checklist. Finally, this study is recommended to use heavyweighted cryptographic techniques on the back-end side instead of lightweight cryptographic techniques to achieve the missed requirements on the studied authentication protocols.
- الملخص الانجليزي
- Security and privacy are significant issues in radio frequency identification (RFID) systems. There are many RFID authentication protocols have been proposed to address those issues. Some of these protocols employ way hashing function as a mechanism for addressing security and privacy issues of RFID systems, other protocols employ random number generator (RNG) and simple functions like cyclic redundancy code (CRC) functions as a mechanism for solving security and privacy problems and some proposals employ simple bitwise operations (e.g. XOR, AND, OR) for enhancing security and privacy of RFID systems. Although the proposed protocols have the capability to supply particular solution for RFID security and privacy issues, they cannot supply integrated solution. This paper is a survey to closely study those protocols in terms of their focus and limitations. In doing so, the security and privacy requirements are identified. Moreover, based on these requirements; 28 Secure RFID-based systems are discussed and compared in a form of checklist. Finally, this study is recommended to use heavyweighted cryptographic techniques on the back-end side instead of lightweight cryptographic techniques to achieve the missed requirements on the studied authentication protocols.
- تاريخ النشر
- 01/01/2017
- الناشر
- Inventi Impact: Information Security
- رقم المجلد
- 2017
- رقم العدد
- 1
- ISSN/ISBN
- 2277-6230
- الصفحات
- 1-12
- رابط الملف
- تحميل (491 مرات التحميل)
- رابط خارجي
- https://www.researchgate.net/publication/309456088_A_SURVEY_OF_RFID_AUTHENTICATION_PROTOCOLS
- الكلمات المفتاحية
- RFID, Security, Authentication, Cryptography