Document Type : Original Research Paper
Authors
1 Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
2 Health Management and Economics Research Center, Iran University of Medical Sciences, Tehran, Iran
3 N. Bagheri Electrical Engineering Department, Shahid Rajaee Teacher Training University, Tehran, Iran Postal code: 16788-15811, Tel/fax:+98-21-2297006
4 Iran Telecom Research Center
Abstract
Background and Objectives: Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable.
Methods: In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the security level, which can provide confidentiality and integrity, simultaneously.
Results: Furthermore, since the proposed protocol belongs to the lightweight protocols category, it is appropriate for applications that require many tags and costs must be low. In terms of the security, the analysis results give a satisfactory security level and it is robust against different RFID threats like replay, traceability and impersonation attacks. Using Ouafi-Phan model, BAN and AVISPA, we also checked the security correctness of the suggested protocol.
Conclusion: In this paper, we presented a scalable lightweight RFID search protocol. We employed an encryption technique called Authenticated Encryption (A.E.) to improve the security level of the suggested protocol.
======================================================================================================
Copyrights
©2018 The author(s). This is an open access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, as long as the original authors and source are cited. No permission is required from the authors or the publishers.
======================================================================================================
Keywords
Main Subjects
Send comment about this article