Detailed Information on Publication Record
2020
Self-adaptive RFID Authentication for Internet of Things
MBAREK, Bacem, Mouzhi GE and Tomáš PITNERBasic information
Original name
Self-adaptive RFID Authentication for Internet of Things
Authors
MBAREK, Bacem (788 Tunisia, belonging to the institution), Mouzhi GE (156 China, guarantor, belonging to the institution) and Tomáš PITNER (203 Czech Republic, belonging to the institution)
Edition
Matsue, Japan, Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA-2019), p. 1094-1105, 12 pp. 2020
Publisher
Springer, Advances in Intelligent Systems and Computing
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
Germany
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
printed version "print"
RIV identification code
RIV/00216224:14330/20:00115027
Organization unit
Faculty of Informatics
ISBN
978-3-030-15031-0
ISSN
Keywords in English
Internet of Things;RFID;Authentication;Jamming attack;Security
Tags
International impact, Reviewed
Změněno: 10/5/2021 04:53, RNDr. Pavel Šmerk, Ph.D.
Abstract
V originále
With the development of wireless Internet of Things (IoT) devices, Radio frequency identification (RFID) has been used as a promising technology for the proliferation and communication in IoT networks. However, the RFID techniques are usually plagued with security and privacy issues due to the inherent weaknesses of underlying wireless radio communications. Although several RFID authentication mechanisms have been proposed to address the security concerns in RFID, most of them are still vulnerable to some active attacks, especially the jamming attack. This paper therefore proposes a novel self-adaptive authentication mechanism with a robust key updating, in order to tackle the security vulnerabilities of key updating algorithms and their inability to jamming attacks. Furthermore, we assess the performance and applicability of our solution with a thorough simulation by taking into account the energy consumption and authentication failure rate.