عنوان المقالة:A SURVEY OF RFID AUTHENTICATION PROTOCOLS A SURVEY OF RFID AUTHENTICATION PROTOCOLS
ا.د. محمد عصام يونس | Mohammed I. Younis | 14096
نوع النشر
مجلة علمية
المؤلفون بالعربي
محمد عصام يونس , مصطفى هاشم عبد الكريم
المؤلفون بالإنجليزي
Mohammed Issam Younis, Mustafa Hashim Abdulkareem
الملخص العربي
Security and privacy are significant issues in radio frequency identification (RFID) systems. There are many RFID authentication protocols have been proposed to address those issues. Some of these protocols employ way hashing function as a mechanism for addressing security and privacy issues of RFID systems, other protocols employ random number generator (RNG) and simple functions like cyclic redundancy code (CRC) functions as a mechanism for solving security and privacy problems and some proposals employ simple bitwise operations (e.g. XOR, AND, OR) for enhancing security and privacy of RFID systems. Although the proposed protocols have the capability to supply particular solution for RFID security and privacy issues, they cannot supply integrated solution. This paper is a survey to closely study those protocols in terms of their focus and limitations. In doing so, the security and privacy requirements are identified. Moreover, based on these requirements; 28 Secure RFID-based systems are discussed and compared in a form of checklist. Finally, this study is recommended to use heavyweighted cryptographic techniques on the back-end side instead of lightweight cryptographic techniques to achieve the missed requirements on the studied authentication protocols.
الملخص الانجليزي
Security and privacy are significant issues in radio frequency identification (RFID) systems. There are many RFID authentication protocols have been proposed to address those issues. Some of these protocols employ way hashing function as a mechanism for addressing security and privacy issues of RFID systems, other protocols employ random number generator (RNG) and simple functions like cyclic redundancy code (CRC) functions as a mechanism for solving security and privacy problems and some proposals employ simple bitwise operations (e.g. XOR, AND, OR) for enhancing security and privacy of RFID systems. Although the proposed protocols have the capability to supply particular solution for RFID security and privacy issues, they cannot supply integrated solution. This paper is a survey to closely study those protocols in terms of their focus and limitations. In doing so, the security and privacy requirements are identified. Moreover, based on these requirements; 28 Secure RFID-based systems are discussed and compared in a form of checklist. Finally, this study is recommended to use heavyweighted cryptographic techniques on the back-end side instead of lightweight cryptographic techniques to achieve the missed requirements on the studied authentication protocols.
تاريخ النشر
01/01/2017
الناشر
Inventi Impact: Information Security
رقم المجلد
2017
رقم العدد
1
ISSN/ISBN
2277-6230
الصفحات
1-12
رابط الملف
تحميل (491 مرات التحميل)
رابط خارجي
https://www.researchgate.net/publication/309456088_A_SURVEY_OF_RFID_AUTHENTICATION_PROTOCOLS
الكلمات المفتاحية
RFID, Security, Authentication, Cryptography
رجوع