4.6 Article

RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure

Journal

SENSORS
Volume 22, Issue 9, Pages -

Publisher

MDPI
DOI: 10.3390/s22093110

Keywords

IoT; RFID; security; authentication; random oracle model

Funding

  1. Taiwan Ministry of Science and Technology [109-2628-E-155-001-MY3]

Ask authors/readers for more resources

The Internet of Things (IoT) is a future trend that connects physical things with the cyber world through the Internet. While IoT technology brings convenience to our daily lives, it also poses security and privacy risks, particularly in RFID-tag-connected devices. To address these concerns, we propose a robust authentication framework for IoT-based RFID infrastructure, which satisfies all security requirements and improves communication performance.
The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have a significant impact on our daily lives. While the growing number of linked IoT devices makes our daily lives easier, it also puts our personal data at risk. In IoT applications, Radio Frequency Identification (RFID) helps in the automatic identification of linked devices, and the dataflow of the system forms a symmetry in communication between the tags and the readers. However, the security and privacy of RFID-tag-connected devices are the key concerns. The communication link is thought to be wireless or insecure, making the RFID system open to several known threats. In order to address these security issues, we propose a robust authentication framework for IoT-based RFID infrastructure. We use formal security analysis in the random oracle model, as well as information analysis to support the claim of secure communication. Regarding the desirable performance characteristics, we describe and analyze the proposed framework's performance and compare it to similar systems. According to our findings, the proposed framework satisfies all security requirements while also improving the communication.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available