z-logo
open-access-imgOpen Access
Design and Implementation of RFID Authentication Protocol based on Simple Symmetric Key (SSK) algorithm
Author(s) -
Dr Prakash Kuppuswamy,
Peer Mohamed Appa M A Y,
Dr.S.Viswanadha Raju
Publication year - 2020
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.f7131.038620
Subject(s) - computer science , radio frequency identification , spoofing attack , authentication (law) , authentication protocol , protocol (science) , key (lock) , otway–rees protocol , identification (biology) , replay attack , wide mouth frog protocol , simple (philosophy) , computer security , computer network , ip address spoofing , challenge handshake authentication protocol , embedded system , internet protocol , the internet , operating system , medicine , philosophy , botany , alternative medicine , epistemology , pathology , biology , network address translation
RFID uses radio frequency waves to transfer data using components such as tag, the reader and back-end server for device identification. Radio Frequency Identification technology (RFID) providing unique identification and tracking any device that has a tag attached to safeguard the products and protect from unauthorized users. There are many kinds of protocols to resolve these problems have been researched. Though, the security, cost, time and task of RFID are accountable to identify the feasible authentication protocol according to the business environment. In this research article, we proposed new authentication protocol as a method to protect privacy, especially for affordable cost and functionalities and have limited power consumption, memory and effective security process. The proposed protocol called as simple symmetric key (SSK) algorithm using random integers based on modulo 37. The proposed authentication protocol is secure against spoofing and replay attack and also it is suitable to support distributed database environment.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here