Author:
Kumar Adarsh,Kumar Sharma Deepak
Abstract
Interconnection of devices through Radio Frequency IDentification (RFID) brings enormous applications that are increasing constantly day by day. Due to the rapid growth of such applications, security of RFID networks becomes crucial and is a major challenge. Classical or lightweight cryptography primitives and protocols are the solutions to enhance the security standards in such networks. Authentication protocols are one of the important security protocols required to be integrated before exchange of secured information. This work surveyed the recently developed authentication protocols. Further, classifications, security challenges, and attack analysis are explored. A comparative analysis of different types of authentication protocols explains their applications in resourceful and resource constraint Internet of Things (IoT). Authentication protocols are categorized into: symmetric, asymmetric, lightweight, ultra-lightweight and group protocols. Symmetric and asymmetric protocols are more suitable for resourceful devices whereas lightweight and ultra-lightweight protocols are designed for resource constraint devices. Security and cost analysis shows that asymmetric protocols provide higher security than any other protocol at a reasonable cost. However, lightweight authentication protocols are suitable for passive RFID devices but do not provide full security.
Reference77 articles.
1. Ashton, K. (2009). That ‘Internet of Things’ Thing, in the real world things matter more than ideas, RFID Journal, Retrieved July 15, 2014, from http://www.rfidjournal.com/articles/view?4986
2. Uckelman D., Harrison M. and Michahelles F. (2011) Architecturing the Internet of Things. Springer-Verlag Berlin Heidelberg
3. Aggarwal, C. C., Ashish, N. and Sheth, A. (2013). The Internet of Things: A Survey from the data-centric Perspective. In Aggarwal, C (Ed.), Managing and Mining Sensor Data (pp. 383–428). Springer-Verlag
4. Abyaneh, M. R. S. (2012). Security Analysis of Lightweight Schemes for RFID Systems. Ph. D.Thesis, University of Bergen, Norway
5. Juel A. and Weis S. (2005). Authenticating Pervasive Devices with Human Protocols. In V. Shoup, editor, Advances in cryptology-Crypto 05, LNCS 3126, pp. 293–298, Springer-Verlag