DocumentCode :
3129298
Title :
RFID tags authentication by unique hash sequence detection
Author :
Alma´aitah, Abdallah Y. ; Hassanein, Hossam S. ; Ibnkahla, Mohamed
Author_Institution :
Electr. & Comput. Eng. Dept., Queen´s Univ., Kingston, ON, Canada
fYear :
2012
fDate :
22-25 Oct. 2012
Firstpage :
775
Lastpage :
781
Abstract :
With the rise of internet of things an immense number of RFID tags will be associated with different systems that require not only strong authentication protocols, but also time- and power- efficient protocols to authenticate more tags in a given time window. In current tag authentication protocols, a tag is considered authentic if the interrogators find a match to the tag´s encrypted (e.g., using some hashing function) reply in the system´s database. Tree-based authentication protocols provide rapid authentication by limiting the searched keys at the interrogator from O(N) to O(log(N)), where N is the number of leaves in the balanced tree. However, if one tag is compromised in such protocols, other tags will be at risk of being compromised. In this paper we propose Unique Hash Sequence Authentication (UHSA) protocol. The protocol utilizes tag-interrogator interaction, with a continuous wave (CW) sensor at the tag to cut off tags encrypted reply when the received bits are enough to determine next node in the tree without receiving the whole reply. Cutting off the encrypted reply limits the information that can be obtained by the adversary to compromise the tag. In addition, the reduction in tag reply length greatly enhances the time and power efficiency of the RFID system during the authentication process by more than 90% when compared to existing authentication protocols.
Keywords :
Internet of Things; computational complexity; cryptographic protocols; power aware computing; radiofrequency identification; trees (mathematics); Internet of things; RFID system; RFID tag authentication protocol; UHSA protocol; continuous wave sensor; power efficiency; power-efficient protocols; system database; tag encryption; tag-interrogator interaction; time-efficient protocols; tree-based authentication protocols; unique hash sequence authentication protocol; unique hash sequence detection; Antennas; Authentication; Backscatter; Cryptography; Databases; Modulation; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on
Conference_Location :
Clearwater, FL
Print_ISBN :
978-1-4673-2130-3
Type :
conf
DOI :
10.1109/LCNW.2012.6424063
Filename :
6424063
Link To Document :
بازگشت