URASP: an ultralightweight RFID authentication scheme using permutation operation
Due to low-cost, ease of use and convenience, Radio Frequency IDentification (RFID) is a contactless technology that has become more and more promising for automatic identification of an object and people without physical contact. However, the RFID system faces major issues related to its security a...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Published: |
Springer
2021
|
Online Access: | http://psasir.upm.edu.my/id/eprint/93495/ https://link.springer.com/article/10.1007/s12083-021-01192-5 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.upm.eprints.93495 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.934952023-01-12T07:24:08Z http://psasir.upm.edu.my/id/eprint/93495/ URASP: an ultralightweight RFID authentication scheme using permutation operation Mohd Shariq Singh, Karan Maurya, Pramod Kumar Ahmadian, Ali Kamel Ariffin, Muhammad Rezal Due to low-cost, ease of use and convenience, Radio Frequency IDentification (RFID) is a contactless technology that has become more and more promising for automatic identification of an object and people without physical contact. However, the RFID system faces major issues related to its security and privacy, where an adversary may eavesdrop, temper, modify, and intercept the transmitted messages over a communication channel. To overcome these issues, there is a flexible and effective way to implement an ultralightweight RFID scheme. Therefore, we present an ultralightweight RFID authentication scheme using permutation operation named URASP in this paper. Our proposed scheme integrates permutation and left rotate operation to provide a higher level of security and privacy without increasing storage and computation overhead. In addition, the informal analysis of our proposal illustrates its ability to overcome all known security attacks. We show that the proposed URASP scheme preserves the properties of tags untraceability and information privacy by using Juels and Weis privacy model. The performance analysis has been performed which demonstrates that the proposed scheme outperforms other existing schemes as well as utilizes fewer resources on tags. The verification of our scheme has been done using Scyther simulation tool. Thereafter, the correctness of our scheme has been verified by using BAN logic inference rules. Hence, the proposed scheme is more suited for low-cost passive RFID tags. Springer 2021-07-10 Article PeerReviewed Mohd Shariq and Singh, Karan and Maurya, Pramod Kumar and Ahmadian, Ali and Kamel Ariffin, Muhammad Rezal (2021) URASP: an ultralightweight RFID authentication scheme using permutation operation. Peer-to-Peer Networking and Applications, 14. pp. 3737-3757. ISSN 1936-6442; ESSN: 1936-6450 https://link.springer.com/article/10.1007/s12083-021-01192-5 10.1007/s12083-021-01192-5 |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
description |
Due to low-cost, ease of use and convenience, Radio Frequency IDentification (RFID) is a contactless technology that has become more and more promising for automatic identification of an object and people without physical contact. However, the RFID system faces major issues related to its security and privacy, where an adversary may eavesdrop, temper, modify, and intercept the transmitted messages over a communication channel. To overcome these issues, there is a flexible and effective way to implement an ultralightweight RFID scheme. Therefore, we present an ultralightweight RFID authentication scheme using permutation operation named URASP in this paper. Our proposed scheme integrates permutation and left rotate operation to provide a higher level of security and privacy without increasing storage and computation overhead. In addition, the informal analysis of our proposal illustrates its ability to overcome all known security attacks. We show that the proposed URASP scheme preserves the properties of tags untraceability and information privacy by using Juels and Weis privacy model. The performance analysis has been performed which demonstrates that the proposed scheme outperforms other existing schemes as well as utilizes fewer resources on tags. The verification of our scheme has been done using Scyther simulation tool. Thereafter, the correctness of our scheme has been verified by using BAN logic inference rules. Hence, the proposed scheme is more suited for low-cost passive RFID tags. |
format |
Article |
author |
Mohd Shariq Singh, Karan Maurya, Pramod Kumar Ahmadian, Ali Kamel Ariffin, Muhammad Rezal |
spellingShingle |
Mohd Shariq Singh, Karan Maurya, Pramod Kumar Ahmadian, Ali Kamel Ariffin, Muhammad Rezal URASP: an ultralightweight RFID authentication scheme using permutation operation |
author_facet |
Mohd Shariq Singh, Karan Maurya, Pramod Kumar Ahmadian, Ali Kamel Ariffin, Muhammad Rezal |
author_sort |
Mohd Shariq |
title |
URASP: an ultralightweight RFID authentication scheme using permutation operation |
title_short |
URASP: an ultralightweight RFID authentication scheme using permutation operation |
title_full |
URASP: an ultralightweight RFID authentication scheme using permutation operation |
title_fullStr |
URASP: an ultralightweight RFID authentication scheme using permutation operation |
title_full_unstemmed |
URASP: an ultralightweight RFID authentication scheme using permutation operation |
title_sort |
urasp: an ultralightweight rfid authentication scheme using permutation operation |
publisher |
Springer |
publishDate |
2021 |
url |
http://psasir.upm.edu.my/id/eprint/93495/ https://link.springer.com/article/10.1007/s12083-021-01192-5 |
_version_ |
1755873901538181120 |
score |
13.211869 |