D 2020

Self-adaptive RFID Authentication for Internet of Things

MBAREK, Bacem, Mouzhi GE and Tomáš PITNER

Basic information

Original name

Self-adaptive RFID Authentication for Internet of Things

Authors

MBAREK, Bacem (788 Tunisia, belonging to the institution), Mouzhi GE (156 China, guarantor, belonging to the institution) and Tomáš PITNER (203 Czech Republic, belonging to the institution)

Edition

Matsue, Japan, Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA-2019), p. 1094-1105, 12 pp. 2020

Publisher

Springer, Advances in Intelligent Systems and Computing

Other information

Language

English

Type of outcome

Stať ve sborníku

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

Germany

Confidentiality degree

není předmětem státního či obchodního tajemství

Publication form

printed version "print"

RIV identification code

RIV/00216224:14330/20:00115027

Organization unit

Faculty of Informatics

ISBN

978-3-030-15031-0

ISSN

Keywords in English

Internet of Things;RFID;Authentication;Jamming attack;Security

Tags

International impact, Reviewed
Změněno: 10/5/2021 04:53, RNDr. Pavel Šmerk, Ph.D.

Abstract

V originále

With the development of wireless Internet of Things (IoT) devices, Radio frequency identification (RFID) has been used as a promising technology for the proliferation and communication in IoT networks. However, the RFID techniques are usually plagued with security and privacy issues due to the inherent weaknesses of underlying wireless radio communications. Although several RFID authentication mechanisms have been proposed to address the security concerns in RFID, most of them are still vulnerable to some active attacks, especially the jamming attack. This paper therefore proposes a novel self-adaptive authentication mechanism with a robust key updating, in order to tackle the security vulnerabilities of key updating algorithms and their inability to jamming attacks. Furthermore, we assess the performance and applicability of our solution with a thorough simulation by taking into account the energy consumption and authentication failure rate.