An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment

@article{Anandhi2020AnAP,
  title={An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment},
  author={S. Anandhi and R. Anitha and Venkatasamy Sureshkumar},
  journal={Wireless Personal Communications},
  year={2020},
  pages={1-23}
}
In supply chain management applications, detection of a large object is made efficient by attaching multiple RFID tags in that object. Each part contains an RFID tag attached by the corresponding vendor. In order to check the availability of the object, it is compulsory to ensure all the parts are existing as well. The RFID tags can be interrogated by any reader deployed in the department. This approach enhances the object detection probability for each object but increases security and privacy… Expand
3 Citations
Multiparty Protocol that Usually Shuffles
TLDR
Two multiparty shuffling protocols where each party, possesses a private input, agrees on a random permutation while keeping the permutation secret are presented, based on permutation network, thereby data-oblivious. Expand

References

SHOWING 1-10 OF 26 REFERENCES
A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment
TLDR
A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment is proposed that can tolerate missing tags and offer sufficient security assurances and resist various attacks. Expand
A new authentication protocol for RFID communication in multi-tag arrangement
  • Subhasish Dhal, I. Gupta
  • Computer Science
  • 2014 International Conference on Computing for Sustainable Global Development (INDIACom)
  • 2014
TLDR
This paper has proposed an efficient authentication scheme which assumes the existence of multiple numbers of tags in an object and does not affect the detection probability in multi-tag arrangement. Expand
An Anonymous Offline RFID Grouping-Proof Protocol
TLDR
The proposed EAGP can protect the security and privacy of RFID tags, and defence impersonation and replay attacks, and has the ability to reduce the system overhead caused by the invalid submission of grouping-proofs. Expand
An efficient mutual authentication RFID scheme based on elliptic curve cryptography
  • J. Chou
  • Computer Science
  • The Journal of Supercomputing
  • 2013
TLDR
A novel RFID authentication protocol based on elliptic curve cryptography is designed, which is more resistant to a variety of attacks and that it has the best scalability, while maintaining competitive levels of efficiency. Expand
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
  • M. Farash
  • Computer Science
  • The Journal of Supercomputing
  • 2014
TLDR
This paper proposes a more secure and efficient RFID authentication protocol that does not only cover all the security flaws and weaknesses of related previous protocols, but also provides more functionality and proves the security of the proposed improved protocol in the random oracle model. Expand
RFID-Tags for Anti-counterfeiting
TLDR
It is shown that a PUF based solution for RFID-tags is feasible in the off-line case and the security protocols that are needed for the detection of the authenticity of a product when it is equipped with such a system are presented. Expand
Privacy and security in library RFID: issues, practices, and architectures
TLDR
Privacy issues related to Radio Frequency Identification in libraries are exposed, current deployments are described, and a simple scheme is given that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations. Expand
On sensor-based solutions for simultaneous presence of multiple RFID tags
TLDR
This work critically evaluates the use of ambient conditions in RFID authentication protocols and chooses to use tag temperature and develop a variant of yoking proof protocol for simultaneous authentication of multiple tags. Expand
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
TLDR
This article proposes a privacy-preserving multi-party grouping-proof protocol which relies exclusively on the use of elliptic curve cryptography (ECC) and presents a novel ECC hardware architecture designed for RFID. Expand
IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics
TLDR
An architecture is proposed for a fine-grained IoT-enabled online object tracking system and a novel secure and efficient end to end authentication protocol that is based on a symmetric key cryptosystem and one-way hash function is proposed. Expand
...
1
2
3
...