scispace - formally typeset
Proceedings ArticleDOI

RFID security in the context of "internet of things"

TLDR
A recently proposed protocol's strengths and weaknesses are discussed and then an improved protocol is proposed, retaining efficiency of the protocol intact, for solving identification issues of objects around us in a cost effective manner.
Abstract
Internet has emerged as a medium to connect entities across the world for emailing, conferencing, trading, gaming and so on. Internet of Things (IoT) is emerging as a global network for connecting any objects (physical or virtual) across the globe, ranging applications from home appliances to consumer electronics. In IoT, physical objects such as home appliances, vehicles, supply-chain items, containers, etc. should have unique identities for interacting among themselves. As a result, unique identification of trillion of objects is a foremost requirement in IoT. RFID (Radio Frequency IDentification) technology plays an important role in IoT for solving identification issues of objects around us in a cost effective manner. The usage of low cost RFID tags draws greater attention from researchers in recent past, as the cost of supply-chain items should not exceed much because of embedded tag cost. The communication between tag and reader takes place over insecure channel. Therefore, security concern has become an important issue in RFID systems. In recent years, several light-weight protocols and improvements have been proposed for RFID security. Some of them have succeeded with their security claim, but many protocols suffer from security weaknesses or design flaws. In this paper, we discuss a recently proposed protocol's strengths and weaknesses and then proposed an improved protocol, retaining efficiency of the protocol intact.

read more

Citations
More filters
Journal ArticleDOI

Internet of Things (IoT): A Literature Review

TL;DR: The main objective of this paper is to provide an overview of Internet of Things, architectures, and vital technologies and their usages in the authors' daily life and this manuscript will give good comprehension for the new researchers and facilitate knowledge accumulation in efficiently.
Journal ArticleDOI

Smart Homes for Elderly Healthcare—Recent Advances and Research Challenges

TL;DR: A comprehensive review on the state-of-the-art research and development in smart home based remote healthcare technologies is presented.
Proceedings ArticleDOI

Security in Internet of Things: Challenges, Solutions and Future Directions

TL;DR: This paper is presenting review of security attacks from the perspective of layers that comprises IoT, and a review of methods that provide solutions to these issues is presented along with their limitations.
Journal ArticleDOI

IoT survey: An SDN and fog computing perspective

TL;DR: This paper critically review the SDN and fog computing-based solutions to overcome the IoT main challenges, highlighting their advantages, and exposing their weaknesses and makes recommendations for the upcoming research work.
Journal ArticleDOI

Perception layer security in Internet of Things

TL;DR: This paper explicitly investigates the security issues in the perception layer of IoT, the countermeasures and the research challenges faced for large scale deployment of IoT.
References
More filters
Journal ArticleDOI

SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity

TL;DR: A new ultralightweight RFID authentication protocol is proposed that provides strong authentication and strong integrity protection of its transmission and of updated data and can resist all the possible attacks.
BookDOI

The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems

TL;DR: The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive, technical, and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems.
Proceedings ArticleDOI

RFID authentication protocol for low-cost tags

TL;DR: This paper proposes a new authentication protocol which provides the identified privacy and security features and is also efficient and shows that it requires less tag-side storage and computation than other similarly structured RFID protocols.
Book ChapterDOI

Security analysis of two ultra-lightweight RFID authentication protocols

TL;DR: This paper analyzes the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP and identifies two effective attacks, namely Desynchronization attack and Fulldisclosure attack, against their protocols.
Posted Content

On the Security of Chien's Ultralightweight RFID Authentication Protocol.

TL;DR: Two desynchronization attacks to break the ultralightweight RFID authentication protocol are found and two patches that slightly modify the protocol are presented in the paper.
Related Papers (5)