Super lightweight mobile RFID authentication protocol for bit replacement operation

Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.

Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan Liu

In the traditional RFID system, the secure wired channel communication is used between the reader and the server, and the new mobile RFID system is different from the traditional RFID system. The reader and the server communicate based on the wireless channel. This makes authentication protocols applicable to traditional RFID systems not applicable to mobile RFID systems. To solve this defect, a two-way authentication protocol MSB is proposed for ultra-lightweight mobile radio frequency identification system based on bit replacement operation. MSB (most significant bit) encrypts information based on bitwise operations, and the amount of computation of the communication entity is reduced. Tags, readers, and servers first authenticate and then communicate. MSB can be resistant to common attacks. The security analysis of the protocol shows that the protocol has high security attributes, and the performance analysis of the protocol shows that the protocol has the characteristics of low calculation volume. The formal analysis of the protocol is given based on GNY logic.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


Sensors ◽  
2020 ◽  
Vol 20 (13) ◽  
pp. 3612
Author(s):  
Malou van der Sluis ◽  
Yvette de Haas ◽  
Britt de Klerk ◽  
T. Bas Rodenburg ◽  
Esther D. Ellen

Individual data are valuable for assessing the health, welfare and performance of broilers. In particular, data on the first few days of life are needed to study the predictive value of traits recorded early in life for later life performance. However, broilers are generally kept in groups, which hampers individual identification and monitoring of animals. Sensor technologies may aid in identifying and monitoring individual animals. In this study, a passive radio frequency identification (RFID) system was implemented to record broiler activity, in combination with traditional video recordings. The two main objectives were (1) to validate the output of the RFID system by comparing it to the recorded locations on video, and (2) to assess whether the number of antennas visited per unit time could serve as a measure of activity, by comparing it to the distance recorded on video and to the distance moved as recorded using a validated ultra-wideband (UWB) tracking system. The locations recorded by the RFID system exactly matched the video in 62.5% of the cases, and in 99.2% of the cases when allowing for a deviation of one antenna grid cell. There were moderately strong Spearman rank correlations between the distance recorded with the RFID system and the distance recorded from video (rs = 0.82) and between UWB and RFID (rs = 0.70) in approximately one-hour recordings, indicating that the RFID system can adequately track relative individual broiler activity, i.e., the activity level of a broiler in comparison to its group members. As the RFID tags are small and lightweight, the RFID system is well suited for monitoring the individual activity of group-housed broilers throughout life.


Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Author(s):  
В.В. БУТЕНКО ◽  
А.С. БАГДАСАРЯН ◽  
С.А. БАГДАСАРЯН ◽  
В.И. НИКОЛАЕВ

Представлен подход к управлению критически важными процессами с использованием инфокоммуникационных систем и стремительно развивающейся технологии поверхностных акустических волн (ПАВ). Проведен краткий анализ принципов работы,особенностей проектирования,методик расчета и найдены оптимальные решения радиочастотных компонентов на ПАВ для RFID-систем. Выполнен анализ способов повышения эффективности RFID-систем для защиты информации от несанкционированного доступа в телекоммуникационных системах. Разработан метод выбора оптимальной радиочастотной системы идентификации с учетом совокупности количественных показателей ее качества. Обоснованы и формализованы основные показатели комплексной оценки эффективности RFID-систем. Разработана методология выбора оптимальной RFID-системы на основе теории нечетких множеств. An approach to the management of critical processes using info-communication systems and the rapidly developing technology of surface acoustic waves (SAW) is presented. A brief analysis of the principles of operation, design features, calculation methods is carried out, and optimal solutions of radio frequency components based on SAW for RFID systems are found. The analysis of ways to improve the efficiency of RFID systems for information access security in telecommunication systems is performed. A method for choosing an optimal radio frequency identification system has been developed taking into account a set of quantitative indicators of its quality. The main indicators of a comprehensive assessment of the effectiveness of RFID systems are substantiated and formalized. A methodology for choosing the optimal RFID system based on the theory of fuzzy values has been developed.


2019 ◽  
Vol 36 (4) ◽  
pp. 13-16
Author(s):  
Hirak Jyoti Hazarika ◽  
S. Ravikumar

Purpose The purpose of this paper is to explain how the author had carried out the implementation of the radio-frequency identification (RFID) system at Central Library, Fakiragram College and to explain to the library professional on how to integrate RFID with Koha integrated library management system (ILMS) in their respective library without taking IT/technical experts assistance. This paper will encourage library professionals to implement RFID technology for the library security and embrace open source software in their institutions. Design/methodology/approach The paper describes the author’s practical experiences regarding implementation of the RFID system and integration of middleware RFID software with library management software. Findings From the present study, it was found that the library staff are having a positive attitude toward embracing RFID technology in their library. The present implementation of RFID technology in the studies area gives a clear picture about integrating a third-party software/tool like RFID to the existing systems and how the new system has helped the library to provide better service to their users Research limitations/implications There were some teething problems at the start between the Koha ILMS SIP2 software and the RFID system. The main issue faced while integration was with setting up the hostname, integrating the instance (i.e. database) and with setting up the port. Practical implications This paper will help librarians to implement RFID technology in a practical way to their libraries. The author implemented Koha ILMS with RFID system at the Central Library, Fakiragram College within 1 month and the author migrated data from common communication format (CCF) format to MARC 21 formats. CCF is basically used in SOUL 2.0 developed by INFLIBNET. Originality/value This study discusses issues and possible solutions in the process of implementing RFID applications for two innovative applications in library services. This will influence library professionals to learn Koha ILMS and RFID technology implement it in their libraries.


2009 ◽  
pp. 879-894
Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Author(s):  
Imad Belkacem ◽  
Safia Nait Bahloul ◽  
Oum-El-Kheir Aktouf

Dependability issues become more and more significant in RFID (Radio Frequency Identification) development and especially in critical domains. However, Operations of reading, detection of readers, and measurements of sensors in a RFID system are inevitably subjected to errors. These factors degrade the overall dependability of RFID systems. The authors study the Fault Tolerance in RFID systems as a means to ensure the dependability. The authors propose to perform a statistical analysis on the RFID tags data, using a confidence interval, at the level of the middleware enabling the detection of erroneous readers and sensors.


2018 ◽  
Vol 14 (1) ◽  
pp. 155014771875496
Author(s):  
Qingkuan Dong ◽  
Mengmeng Chen ◽  
Lulu Li ◽  
Kai Fan

With the development of the Internet of things and cloud storage, a large number of objects access to the Internet through radio frequency identification technology, cloud-based radio frequency identification system attracts more attention because it can reduce the costs of system maintenance by renting the cloud storage service on demand. Especially, it is very suitable for the small- and medium-sized enterprises. However, the security and privacy issues of the cloud-based radio frequency identification system are more serious than traditional radio frequency identification systems. The link between the reader and the cloud is no longer secure, and the cloud service provider is not trusted. Both the location privacy of the reader and the data privacy of the radio frequency identification system are not able to be exposed to the cloud service provider. In this article, a cloud-based radio frequency identification authentication protocol is proposed. It considers not only the mutual authentication between the reader and the tag, but also the security of data transmission between the reader and the cloud database. In particular, in order to solve the reader’s location privacy problem, the proposed scheme introduces MIPv6 network framework without adding additional infrastructure. The experimental verification with AVISPA tool shows that the protocol satisfies the mutual authentication property. Compared with other cloud-based schemes, the proposed protocol has obvious advantages in deployment cost, scalability, real-time authentication, and the tag’s computational complexity.


Sign in / Sign up

Export Citation Format

Share Document