RFID-enabled protocol based on eigenvalues and eigenvectors of a matrix

Haradhan Ghosh,Pramod Kumar Maurya,Satya Bagchi
DOI: https://doi.org/10.1504/ijahuc.2024.141960
2024-10-04
International Journal of Ad Hoc and Ubiquitous Computing
Abstract:Radio frequency identification technology has been rapidly embraced throughout different wireless communication domains as one of the primary identification solutions for the internet of things. Most present RFID authentication techniques are susceptible to a wide range of malicious attacks. A typical security feature in RFID authentication protocols is key updating, which leads to desynchronisation attacks. We propose a shared key update approach to overcome this issue by the hash function, properties of eigenvectors of a matrix, and addition and concatenation operations. Formal and informal security analyses of the proposed protocol reveal that it is durable to numerous assaults. To simulate the protocol, we apply the Scyther tool, and the findings suggest that the proposed protocol may endure severe assaults. The performance analysis also shows that it has less computation costs on the tag side, making it suitable for use in real-time control systems.
computer science, information systems,telecommunications
What problem does this paper attempt to address?