5G-Compliant Authentication Protocol for RFID
The term “Internet of Things” was originally coined when radio frequency identification (RFID) technology was being developed to refer to applications where RFID tagged objects and sensors enabled computers to achieve effective situational awareness without human intervention. Currently, this term e...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-11-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/9/11/1951 |
_version_ | 1797547526829637632 |
---|---|
author | Jorge Munilla Adel Hassan Mike Burmester |
author_facet | Jorge Munilla Adel Hassan Mike Burmester |
author_sort | Jorge Munilla |
collection | DOAJ |
description | The term “Internet of Things” was originally coined when radio frequency identification (RFID) technology was being developed to refer to applications where RFID tagged objects and sensors enabled computers to achieve effective situational awareness without human intervention. Currently, this term encompasses a myriad of medium/small devices connected to the Internet. On the other hand, 5G is a key enabling technology that will support next generation wireless communications. Moreover, 5G aims to realize the “Internet of Everything”. Surprisingly, despite the expected relationship between these two technologies, RFID tags have not been properly integrated into 4G and it is not clear if this will change in 5G. RFID is considered as a parallel technology where, at best, it has connection to the core network using back-end servers as gateways between the two technologies. With the aim of overcoming this problem, this paper proposes a 5G compliant RFID protocol that allows RFID tags to act as fully fledged 5G subscribers while taking into account the main characteristics of RFID systems. This proposal leverages the separation between USIM and mobile equipment within the user equipment to implement a 5G compliant protocol where tags accomplish the authentication part, as 5G subscribers, while readers assume the mobile equipment role, carrying out the 5G communication and most of the resource consuming tasks. |
first_indexed | 2024-03-10T14:45:19Z |
format | Article |
id | doaj.art-e643bd252f33410c800e384a3ab575cc |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-10T14:45:19Z |
publishDate | 2020-11-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-e643bd252f33410c800e384a3ab575cc2023-11-20T21:29:07ZengMDPI AGElectronics2079-92922020-11-01911195110.3390/electronics91119515G-Compliant Authentication Protocol for RFIDJorge Munilla0Adel Hassan1Mike Burmester2E.T.S.I. de Telecomunicación, Departamento de Ingeniería de Comunicaciones, Universidad de Málaga, 29071 Málaga, SpainComputer Science and Information Technology Department, Al-Quds University, Main Campus, Abu Dis P.O. Box 89, PalestineComputer Science Department, Florida State University, Tallahassee, FL 32306-4530, USAThe term “Internet of Things” was originally coined when radio frequency identification (RFID) technology was being developed to refer to applications where RFID tagged objects and sensors enabled computers to achieve effective situational awareness without human intervention. Currently, this term encompasses a myriad of medium/small devices connected to the Internet. On the other hand, 5G is a key enabling technology that will support next generation wireless communications. Moreover, 5G aims to realize the “Internet of Everything”. Surprisingly, despite the expected relationship between these two technologies, RFID tags have not been properly integrated into 4G and it is not clear if this will change in 5G. RFID is considered as a parallel technology where, at best, it has connection to the core network using back-end servers as gateways between the two technologies. With the aim of overcoming this problem, this paper proposes a 5G compliant RFID protocol that allows RFID tags to act as fully fledged 5G subscribers while taking into account the main characteristics of RFID systems. This proposal leverages the separation between USIM and mobile equipment within the user equipment to implement a 5G compliant protocol where tags accomplish the authentication part, as 5G subscribers, while readers assume the mobile equipment role, carrying out the 5G communication and most of the resource consuming tasks.https://www.mdpi.com/2079-9292/9/11/19515G5G-AKAsecurityUSIMprimary authenticationRFID |
spellingShingle | Jorge Munilla Adel Hassan Mike Burmester 5G-Compliant Authentication Protocol for RFID Electronics 5G 5G-AKA security USIM primary authentication RFID |
title | 5G-Compliant Authentication Protocol for RFID |
title_full | 5G-Compliant Authentication Protocol for RFID |
title_fullStr | 5G-Compliant Authentication Protocol for RFID |
title_full_unstemmed | 5G-Compliant Authentication Protocol for RFID |
title_short | 5G-Compliant Authentication Protocol for RFID |
title_sort | 5g compliant authentication protocol for rfid |
topic | 5G 5G-AKA security USIM primary authentication RFID |
url | https://www.mdpi.com/2079-9292/9/11/1951 |
work_keys_str_mv | AT jorgemunilla 5gcompliantauthenticationprotocolforrfid AT adelhassan 5gcompliantauthenticationprotocolforrfid AT mikeburmester 5gcompliantauthenticationprotocolforrfid |