Using dummy data for RFID tag and reader authentication

Radio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags. In this paper, we propose an authentication protocol based on moni...

Full description

Bibliographic Details
Main Authors: Baha’ A. Alsaify, Dale R. Thompson, Abdallah Alma'aitah, Jia Di
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2022-10-01
Series:Digital Communications and Networks
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2352864821000687
_version_ 1811313952198492160
author Baha’ A. Alsaify
Dale R. Thompson
Abdallah Alma'aitah
Jia Di
author_facet Baha’ A. Alsaify
Dale R. Thompson
Abdallah Alma'aitah
Jia Di
author_sort Baha’ A. Alsaify
collection DOAJ
description Radio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags. In this paper, we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system. The proposed authentication scheme is based on injecting decoys within the exchanged communications (between RFID readers and tags) and is used in the authentication process. Furthermore, the proposed authentication scheme is mathematically modeled and validated using extensive simulation. The simulations results show that the proposed scheme provides a 100% confidence level in the authentication of tags and detection of compromised readers.
first_indexed 2024-04-13T11:03:26Z
format Article
id doaj.art-8e599cc9590140afb84a1e3f222aa379
institution Directory Open Access Journal
issn 2352-8648
language English
last_indexed 2024-04-13T11:03:26Z
publishDate 2022-10-01
publisher KeAi Communications Co., Ltd.
record_format Article
series Digital Communications and Networks
spelling doaj.art-8e599cc9590140afb84a1e3f222aa3792022-12-22T02:49:20ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482022-10-0185804813Using dummy data for RFID tag and reader authenticationBaha’ A. Alsaify0Dale R. Thompson1Abdallah Alma'aitah2Jia Di3Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, 21163, Jordan; Corresponding author.Computer Science and Computer Engineering Department, University of Arkansas, Fayetteville, 72701, AR, USADepartment of Network Engineering and Security, Jordan University of Science and Technology, Irbid, 21163, JordanComputer Science and Computer Engineering Department, University of Arkansas, Fayetteville, 72701, AR, USARadio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags. In this paper, we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system. The proposed authentication scheme is based on injecting decoys within the exchanged communications (between RFID readers and tags) and is used in the authentication process. Furthermore, the proposed authentication scheme is mathematically modeled and validated using extensive simulation. The simulations results show that the proposed scheme provides a 100% confidence level in the authentication of tags and detection of compromised readers.http://www.sciencedirect.com/science/article/pii/S2352864821000687RFIDAuthenticationDummy dataSecurityDecoys
spellingShingle Baha’ A. Alsaify
Dale R. Thompson
Abdallah Alma'aitah
Jia Di
Using dummy data for RFID tag and reader authentication
Digital Communications and Networks
RFID
Authentication
Dummy data
Security
Decoys
title Using dummy data for RFID tag and reader authentication
title_full Using dummy data for RFID tag and reader authentication
title_fullStr Using dummy data for RFID tag and reader authentication
title_full_unstemmed Using dummy data for RFID tag and reader authentication
title_short Using dummy data for RFID tag and reader authentication
title_sort using dummy data for rfid tag and reader authentication
topic RFID
Authentication
Dummy data
Security
Decoys
url http://www.sciencedirect.com/science/article/pii/S2352864821000687
work_keys_str_mv AT bahaaalsaify usingdummydataforrfidtagandreaderauthentication
AT dalerthompson usingdummydataforrfidtagandreaderauthentication
AT abdallahalmaaitah usingdummydataforrfidtagandreaderauthentication
AT jiadi usingdummydataforrfidtagandreaderauthentication