B D Deebak, Al-Turjman Fadi, Mostarda Leonardo
Schoool of Computer Science and Engineering, Vellore Institute of Technology, Vellore-632014, India.
Computer Engineering Department, Antalya Bilim University, 07190-Antalya, Turkey.
Sensors (Basel). 2019 Sep 4;19(18):3821. doi: 10.3390/s19183821.
With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures, iris scanners, etc., to infer the environmental status. These devices are generally identified using radio-frequency identification (RFID) to transfer the collected data to other local or remote objects over a geographical location. To enable automatic data collection and transition, a valid RFID embedded object is highly recommended. It is used to authorize the devices at various communication phases. In smart application devices, RFID-based authentication is enabled to provide short-range operation. On the other hand, it does not require the communication device to be in line-of-sight to gain server access like bar-code systems. However, in existing authentication schemes, an adversary may capture private user data to create a forgery problem. Also, another issue is the high computation cost. Thus, several studies have addressed the usage of context-aware authentication schemes for multimedia device management systems. The security objective is to determine the user authenticity in order to withhold the eavesdropping and tracing. Lately, RFID has played a significant for the context-aware sensor management systems (CASMS) as it can reduce the complexity of the sensor systems, it can be available in access control, sensor monitoring, real time inventory and security-aware management systems. Lately, this technology has opened up its wings for CASMS, where the challenging issues are tag-anonymity, mutual authentication and untraceability. Thus, this paper proposes a secure hash-based RFID mechanism for CASMS. This proposed protocol is based on the hash operation with the synchronized secret session-key to withstand any attacks, such as desynchronization, replay and man-in-the-middle. Importantly, the security and performance analysis proves that the proposed hash-based protocol achieves better security and performance efficiencies than other related schemes. From the simulation results, it is observed that the proposed scheme is secure, robust and less expensive while achieving better communication metrics such as packet delivery ratio, end-to-end delay and throughput rate.
随着机器对机器(M2M)和设备对设备(D2D)通信领域的技术进步,各种智能计算设备现在集成了一组多媒体传感器,如加速度计、气压计、摄像头、指纹传感器、手势传感器、虹膜扫描仪等,以推断环境状况。这些设备通常使用射频识别(RFID)进行识别,以便在地理位置上把收集到的数据传输到其他本地或远程对象。为实现自动数据收集和传输,强烈建议使用有效的嵌入式RFID对象。它用于在各个通信阶段对设备进行授权。在智能应用设备中,启用基于RFID的认证以提供短程操作。另一方面,它不像条形码系统那样要求通信设备必须在视线范围内才能访问服务器。然而,在现有的认证方案中,对手可能会捕获用户的私人数据,从而产生伪造问题。另外一个问题是计算成本高。因此,一些研究探讨了在多媒体设备管理系统中使用上下文感知认证方案。安全目标是确定用户的真实性,以防止窃听和追踪。最近,RFID在上下文感知传感器管理系统(CASMS)中发挥了重要作用,因为它可以降低传感器系统的复杂性,可用于访问控制、传感器监测、实时库存和安全感知管理系统。最近,这项技术在CASMS中大展身手,其中具有挑战性的问题是标签匿名性、相互认证和不可追踪性。因此,本文提出了一种用于CASMS的基于安全哈希的RFID机制。该提议的协议基于哈希操作和同步的秘密会话密钥,以抵御任何攻击,如去同步、重放和中间人攻击。重要的是,安全和性能分析证明,所提出的基于哈希的协议比其他相关方案具有更好的安全性和性能效率。从仿真结果可以看出,所提出的方案是安全、稳健且成本较低的,同时实现了更好的通信指标,如数据包交付率、端到端延迟和吞吐率。