Using dummy data for RFID tag and reader authentication
Radio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags. In this paper, we propose an authentication protocol based on moni...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2022-10-01
|
Series: | Digital Communications and Networks |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2352864821000687 |
_version_ | 1811313952198492160 |
---|---|
author | Baha’ A. Alsaify Dale R. Thompson Abdallah Alma'aitah Jia Di |
author_facet | Baha’ A. Alsaify Dale R. Thompson Abdallah Alma'aitah Jia Di |
author_sort | Baha’ A. Alsaify |
collection | DOAJ |
description | Radio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags. In this paper, we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system. The proposed authentication scheme is based on injecting decoys within the exchanged communications (between RFID readers and tags) and is used in the authentication process. Furthermore, the proposed authentication scheme is mathematically modeled and validated using extensive simulation. The simulations results show that the proposed scheme provides a 100% confidence level in the authentication of tags and detection of compromised readers. |
first_indexed | 2024-04-13T11:03:26Z |
format | Article |
id | doaj.art-8e599cc9590140afb84a1e3f222aa379 |
institution | Directory Open Access Journal |
issn | 2352-8648 |
language | English |
last_indexed | 2024-04-13T11:03:26Z |
publishDate | 2022-10-01 |
publisher | KeAi Communications Co., Ltd. |
record_format | Article |
series | Digital Communications and Networks |
spelling | doaj.art-8e599cc9590140afb84a1e3f222aa3792022-12-22T02:49:20ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482022-10-0185804813Using dummy data for RFID tag and reader authenticationBaha’ A. Alsaify0Dale R. Thompson1Abdallah Alma'aitah2Jia Di3Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, 21163, Jordan; Corresponding author.Computer Science and Computer Engineering Department, University of Arkansas, Fayetteville, 72701, AR, USADepartment of Network Engineering and Security, Jordan University of Science and Technology, Irbid, 21163, JordanComputer Science and Computer Engineering Department, University of Arkansas, Fayetteville, 72701, AR, USARadio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags. In this paper, we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system. The proposed authentication scheme is based on injecting decoys within the exchanged communications (between RFID readers and tags) and is used in the authentication process. Furthermore, the proposed authentication scheme is mathematically modeled and validated using extensive simulation. The simulations results show that the proposed scheme provides a 100% confidence level in the authentication of tags and detection of compromised readers.http://www.sciencedirect.com/science/article/pii/S2352864821000687RFIDAuthenticationDummy dataSecurityDecoys |
spellingShingle | Baha’ A. Alsaify Dale R. Thompson Abdallah Alma'aitah Jia Di Using dummy data for RFID tag and reader authentication Digital Communications and Networks RFID Authentication Dummy data Security Decoys |
title | Using dummy data for RFID tag and reader authentication |
title_full | Using dummy data for RFID tag and reader authentication |
title_fullStr | Using dummy data for RFID tag and reader authentication |
title_full_unstemmed | Using dummy data for RFID tag and reader authentication |
title_short | Using dummy data for RFID tag and reader authentication |
title_sort | using dummy data for rfid tag and reader authentication |
topic | RFID Authentication Dummy data Security Decoys |
url | http://www.sciencedirect.com/science/article/pii/S2352864821000687 |
work_keys_str_mv | AT bahaaalsaify usingdummydataforrfidtagandreaderauthentication AT dalerthompson usingdummydataforrfidtagandreaderauthentication AT abdallahalmaaitah usingdummydataforrfidtagandreaderauthentication AT jiadi usingdummydataforrfidtagandreaderauthentication |