vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff44572b000000c8a9060001000400 RFID uses radio frequency waves to transfer data using components such as tag, the reader and back-end server for device identification. Radio Frequency Identification technology (RFID) providing unique identification and tracking any device that has a tag attached to safeguard the products and protect from unauthorized users. There are many kinds of protocols to resolve these problems have been researched. Though, the security, cost, time and task of RFID are accountable to identify the feasible authentication protocol according to the business environment. In this research article, we proposed new authentication protocol as a method to protect privacy, especially for affordable cost and functionalities and have limited power consumption, memory and effective security process. The proposed protocol called as simple symmetric key (SSK) algorithm using random integers based on modulo 37. The proposed authentication protocol is secure against spoofing and replay attack and also it is suitable to support distributed database environment.
Prakash Kuppuswamy1, Shanmugasundaram2, Rajan John3 Department of Computer Networks and Engineering, College of Computer Science and Information Technology, Jazan University, Saudi Arabia1, Department of Computer Science, College of Computer Science and Information Technology, Jazan University, Saudi Arabia2,3
RFID, Security, Symmetric Key Algorithm, Authentication, SSK, AES, DES
January | February | March | April | May | June | July | August | September | October | November | December |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| Published By : ICTACT
Published In :
ICTACT Journal on Communication Technology ( Volume: 10 , Issue: 4 , Pages: 2103-2106 )
Date of Publication :
December 2019
Page Views :
499
Full Text Views :
|