Cargando…

A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems

With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures, iris scanners, etc., to infer the e...

Descripción completa

Detalles Bibliográficos
Autores principales: B D, Deebak, Al-Turjman, Fadi, Mostarda, Leonardo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6766990/
https://www.ncbi.nlm.nih.gov/pubmed/31487847
http://dx.doi.org/10.3390/s19183821
_version_ 1783454813490511872
author B D, Deebak
Al-Turjman, Fadi
Mostarda, Leonardo
author_facet B D, Deebak
Al-Turjman, Fadi
Mostarda, Leonardo
author_sort B D, Deebak
collection PubMed
description With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures, iris scanners, etc., to infer the environmental status. These devices are generally identified using radio-frequency identification (RFID) to transfer the collected data to other local or remote objects over a geographical location. To enable automatic data collection and transition, a valid RFID embedded object is highly recommended. It is used to authorize the devices at various communication phases. In smart application devices, RFID-based authentication is enabled to provide short-range operation. On the other hand, it does not require the communication device to be in line-of-sight to gain server access like bar-code systems. However, in existing authentication schemes, an adversary may capture private user data to create a forgery problem. Also, another issue is the high computation cost. Thus, several studies have addressed the usage of context-aware authentication schemes for multimedia device management systems. The security objective is to determine the user authenticity in order to withhold the eavesdropping and tracing. Lately, RFID has played a significant for the context-aware sensor management systems (CASMS) as it can reduce the complexity of the sensor systems, it can be available in access control, sensor monitoring, real time inventory and security-aware management systems. Lately, this technology has opened up its wings for CASMS, where the challenging issues are tag-anonymity, mutual authentication and untraceability. Thus, this paper proposes a secure hash-based RFID mechanism for CASMS. This proposed protocol is based on the hash operation with the synchronized secret session-key to withstand any attacks, such as desynchronization, replay and man-in-the-middle. Importantly, the security and performance analysis proves that the proposed hash-based protocol achieves better security and performance efficiencies than other related schemes. From the simulation results, it is observed that the proposed scheme is secure, robust and less expensive while achieving better communication metrics such as packet delivery ratio, end-to-end delay and throughput rate.
format Online
Article
Text
id pubmed-6766990
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-67669902019-10-02 A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems B D, Deebak Al-Turjman, Fadi Mostarda, Leonardo Sensors (Basel) Article With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures, iris scanners, etc., to infer the environmental status. These devices are generally identified using radio-frequency identification (RFID) to transfer the collected data to other local or remote objects over a geographical location. To enable automatic data collection and transition, a valid RFID embedded object is highly recommended. It is used to authorize the devices at various communication phases. In smart application devices, RFID-based authentication is enabled to provide short-range operation. On the other hand, it does not require the communication device to be in line-of-sight to gain server access like bar-code systems. However, in existing authentication schemes, an adversary may capture private user data to create a forgery problem. Also, another issue is the high computation cost. Thus, several studies have addressed the usage of context-aware authentication schemes for multimedia device management systems. The security objective is to determine the user authenticity in order to withhold the eavesdropping and tracing. Lately, RFID has played a significant for the context-aware sensor management systems (CASMS) as it can reduce the complexity of the sensor systems, it can be available in access control, sensor monitoring, real time inventory and security-aware management systems. Lately, this technology has opened up its wings for CASMS, where the challenging issues are tag-anonymity, mutual authentication and untraceability. Thus, this paper proposes a secure hash-based RFID mechanism for CASMS. This proposed protocol is based on the hash operation with the synchronized secret session-key to withstand any attacks, such as desynchronization, replay and man-in-the-middle. Importantly, the security and performance analysis proves that the proposed hash-based protocol achieves better security and performance efficiencies than other related schemes. From the simulation results, it is observed that the proposed scheme is secure, robust and less expensive while achieving better communication metrics such as packet delivery ratio, end-to-end delay and throughput rate. MDPI 2019-09-04 /pmc/articles/PMC6766990/ /pubmed/31487847 http://dx.doi.org/10.3390/s19183821 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
B D, Deebak
Al-Turjman, Fadi
Mostarda, Leonardo
A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
title A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
title_full A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
title_fullStr A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
title_full_unstemmed A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
title_short A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
title_sort hash-based rfid authentication mechanism for context-aware management in iot-based multimedia systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6766990/
https://www.ncbi.nlm.nih.gov/pubmed/31487847
http://dx.doi.org/10.3390/s19183821
work_keys_str_mv AT bddeebak ahashbasedrfidauthenticationmechanismforcontextawaremanagementiniotbasedmultimediasystems
AT alturjmanfadi ahashbasedrfidauthenticationmechanismforcontextawaremanagementiniotbasedmultimediasystems
AT mostardaleonardo ahashbasedrfidauthenticationmechanismforcontextawaremanagementiniotbasedmultimediasystems
AT bddeebak hashbasedrfidauthenticationmechanismforcontextawaremanagementiniotbasedmultimediasystems
AT alturjmanfadi hashbasedrfidauthenticationmechanismforcontextawaremanagementiniotbasedmultimediasystems
AT mostardaleonardo hashbasedrfidauthenticationmechanismforcontextawaremanagementiniotbasedmultimediasystems