rfid

rfid

Available online at www.sciencedirect.com

ScienceDirect
Procedia Computer Science 78 (2016) 100 – 106

International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015,
Nagpur, INDIA

A secure authentication scheme for RFID systems
Prajnamaya Dassa,*, Hari Omb
a,b

Department of Computer Science and Engineering, Indian School Mines, Dhanbad, Jharkhand, 826004

Abstract
Day by day the importance of Radio Frequency Identification (RFID) systems is increasing for its powerful capabilities in
automatic identification, localization and access control of the objects. However, the RFID techniques are plagued to security and
privacy issues due to underlying wireless communication channel. In order to come up with a solution, we propose an efficient
authentication scheme which uses pseudorandom number generators (PRNG) and some simple cryptographic operations.
Moreover, as the current generation tags come with in-built pseudo random generators, the implementations of these operations
are possible with low complexity. The secret information stored inside the tags is communicated in a more secure way ensuring
confidentiality, integrity, and authentication. The security of our proposed scheme is analyzed against different attacks on RFID
and with the performance of some existing protocols. Experimental results show a significant improvement in security with
average cost, when compared with the existing techniques.
©
byby
Elsevier
B.V.B.V.
This is an open access article under the CC BY-NC-ND license
© 2016
2016The
TheAuthors.
Authors.Published
Published
Elsevier
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
Peer-review under responsibility of organizing committee of the ICISP2015.
Peer-review under responsibility of organizing committee of the ICISP2015
Keywords: Secret; Authentication; Pseudorandom number generator; RFID; Attack.

1. Introduction
Technological advancements in the field of wireless...

Similar Essays