Nothing Special   »   [go: up one dir, main page]

Reference Hub99
Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags

Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags

Aakanksha Tewari, Brij B. Gupta
Copyright: © 2020 |Volume: 16 |Issue: 3 |Pages: 15
ISSN: 1552-6283|EISSN: 1552-6291|EISBN13: 9781799805250|DOI: 10.4018/IJSWIS.2020070102
Cite Article Cite Article

MLA

Tewari, Aakanksha, and Brij B. Gupta. "Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags." IJSWIS vol.16, no.3 2020: pp.20-34. http://doi.org/10.4018/IJSWIS.2020070102

APA

Tewari, A. & Gupta, B. B. (2020). Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags. International Journal on Semantic Web and Information Systems (IJSWIS), 16(3), 20-34. http://doi.org/10.4018/IJSWIS.2020070102

Chicago

Tewari, Aakanksha, and Brij B. Gupta. "Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags," International Journal on Semantic Web and Information Systems (IJSWIS) 16, no.3: 20-34. http://doi.org/10.4018/IJSWIS.2020070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Internet of Things (IoT) is playing more and more important roles in our daily lives in the last decade. It can be a part of traditional machine or equipment to daily household objects as well as wireless sensor networks and devices. IoT has a huge potential which is still to be unleashed. However, as the foundation of IoT is the Internet and all the data collected by these devices is over the Internet, these devices also face threats to security and privacy. At the physical or sensor layer of IoT devices the most commonly used technology is RFID. Thus, securing the RFID tag by cryptographic mechanisms can secure our data at the device as well as during communication. This article first discusses the flaws of our previous ultra-lightweight protocol due to its vulnerability to passive secret disclosure attack. Then, the authors propose a new protocol to overcome the shortcomings of our previous work. The proposed scheme uses timestamps in addition to bitwise operation to provide security against de-synchronization and disclosure. This research also presents a security and performance analysis of our approach and its comparison with other existing schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.