5G-Compliant Authentication Protocol for RFID

The term “Internet of Things” was originally coined when radio frequency identification (RFID) technology was being developed to refer to applications where RFID tagged objects and sensors enabled computers to achieve effective situational awareness without human intervention. Currently, this term e...

Full description

Bibliographic Details
Main Authors: Jorge Munilla, Adel Hassan, Mike Burmester
Format: Article
Language:English
Published: MDPI AG 2020-11-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/9/11/1951
_version_ 1797547526829637632
author Jorge Munilla
Adel Hassan
Mike Burmester
author_facet Jorge Munilla
Adel Hassan
Mike Burmester
author_sort Jorge Munilla
collection DOAJ
description The term “Internet of Things” was originally coined when radio frequency identification (RFID) technology was being developed to refer to applications where RFID tagged objects and sensors enabled computers to achieve effective situational awareness without human intervention. Currently, this term encompasses a myriad of medium/small devices connected to the Internet. On the other hand, 5G is a key enabling technology that will support next generation wireless communications. Moreover, 5G aims to realize the “Internet of Everything”. Surprisingly, despite the expected relationship between these two technologies, RFID tags have not been properly integrated into 4G and it is not clear if this will change in 5G. RFID is considered as a parallel technology where, at best, it has connection to the core network using back-end servers as gateways between the two technologies. With the aim of overcoming this problem, this paper proposes a 5G compliant RFID protocol that allows RFID tags to act as fully fledged 5G subscribers while taking into account the main characteristics of RFID systems. This proposal leverages the separation between USIM and mobile equipment within the user equipment to implement a 5G compliant protocol where tags accomplish the authentication part, as 5G subscribers, while readers assume the mobile equipment role, carrying out the 5G communication and most of the resource consuming tasks.
first_indexed 2024-03-10T14:45:19Z
format Article
id doaj.art-e643bd252f33410c800e384a3ab575cc
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T14:45:19Z
publishDate 2020-11-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-e643bd252f33410c800e384a3ab575cc2023-11-20T21:29:07ZengMDPI AGElectronics2079-92922020-11-01911195110.3390/electronics91119515G-Compliant Authentication Protocol for RFIDJorge Munilla0Adel Hassan1Mike Burmester2E.T.S.I. de Telecomunicación, Departamento de Ingeniería de Comunicaciones, Universidad de Málaga, 29071 Málaga, SpainComputer Science and Information Technology Department, Al-Quds University, Main Campus, Abu Dis P.O. Box 89, PalestineComputer Science Department, Florida State University, Tallahassee, FL 32306-4530, USAThe term “Internet of Things” was originally coined when radio frequency identification (RFID) technology was being developed to refer to applications where RFID tagged objects and sensors enabled computers to achieve effective situational awareness without human intervention. Currently, this term encompasses a myriad of medium/small devices connected to the Internet. On the other hand, 5G is a key enabling technology that will support next generation wireless communications. Moreover, 5G aims to realize the “Internet of Everything”. Surprisingly, despite the expected relationship between these two technologies, RFID tags have not been properly integrated into 4G and it is not clear if this will change in 5G. RFID is considered as a parallel technology where, at best, it has connection to the core network using back-end servers as gateways between the two technologies. With the aim of overcoming this problem, this paper proposes a 5G compliant RFID protocol that allows RFID tags to act as fully fledged 5G subscribers while taking into account the main characteristics of RFID systems. This proposal leverages the separation between USIM and mobile equipment within the user equipment to implement a 5G compliant protocol where tags accomplish the authentication part, as 5G subscribers, while readers assume the mobile equipment role, carrying out the 5G communication and most of the resource consuming tasks.https://www.mdpi.com/2079-9292/9/11/19515G5G-AKAsecurityUSIMprimary authenticationRFID
spellingShingle Jorge Munilla
Adel Hassan
Mike Burmester
5G-Compliant Authentication Protocol for RFID
Electronics
5G
5G-AKA
security
USIM
primary authentication
RFID
title 5G-Compliant Authentication Protocol for RFID
title_full 5G-Compliant Authentication Protocol for RFID
title_fullStr 5G-Compliant Authentication Protocol for RFID
title_full_unstemmed 5G-Compliant Authentication Protocol for RFID
title_short 5G-Compliant Authentication Protocol for RFID
title_sort 5g compliant authentication protocol for rfid
topic 5G
5G-AKA
security
USIM
primary authentication
RFID
url https://www.mdpi.com/2079-9292/9/11/1951
work_keys_str_mv AT jorgemunilla 5gcompliantauthenticationprotocolforrfid
AT adelhassan 5gcompliantauthenticationprotocolforrfid
AT mikeburmester 5gcompliantauthenticationprotocolforrfid