Abstract
Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges in the constrained nature of RFID applications by applying a light-weight cryptographic method with advanced-level 128 bit security protection. Thus, IMAKA-Tate protects the RFID system from various security and privacy threats (e.g. unauthorized tracking, cloning attack, etc.).
Article PDF
Avoid common mistakes on your manuscript.
References
J.-L. Beuchat, E. Lpez-Trejo, L. Martnez-Ramos, S. Mitsunari, F. Rodrguez-Henrquez, “Multi-core implementation of the tate pairing over supersingular elliptic curves,” Proceedings of the 8th International Conference in Cryptology and Network Security, December, 2009.
X. Xiong, D. Wong, X. Deng, “Tinypairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks,” IEEE Wireless Communications and Networking Conference (WCNC), 2010.
C. Mulkey, D. Kar, A. Katangur, “Towards an Efficient Protocol for Privacy and Authentication in Wireless Networks,” The 12th International Conference on Security and Management, 2013.
P. Szczechowiak, M. Collier, Tinyibe: Identity-based encryption for heterogeneous sensor networks, in: 5th International Conference on Intelligent Sensors, Sensor Networks, and Information Processing, 2009.
V. Kolesnikov, G.S. Sundaram, “IBAKE: Identity-Based Authenticated Key Exchange Protocol, IACR Cryptology ePrint Archive,” 2011.
V. Kolesnikov and C. Rackoff, Key exchange using passwords and long keys. In Theory of Cryptography, LNCS volume 3876, Springer, 2006.
Vladimir Kolesnikov and Charles Rackoff. Password mistyping in two-factor- authenticated key exchange. In ICALP (2), pages 702–714, 2008.
V. Cakulev, G. Sundaram, and I. Broustis, “IBAKE: Identity-Based Authenticated Key Exchange,” RFC 6539, March 2012.
D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Proc. of CRYPTO 01, LNCS 2139, pp. 213–229, 2001.
D. Boneh and X. Boyen, “Efficient selective-ID secure identity based encryption without random oracles,” In Proc. of EUROCRYPT, 2004.
V. Cakulev and I. Broustis, “An EAP Authentication Method Based on Identity-Based Authenticated Key Exchange,” draft-cakulev-emu-eap-ibake-03.txt, August 2012, work in progress.
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, “Extensible Authentication Protocol (EAP),” RFC: 3748, June 2004.
M.F. Sadikin, M. Kyas, “IMAKA-Tate: Secure and Efficient Privacy Preserving for Indoor Positioning Applications,” The 5th Int. Conf. on Smart Communications in Network Technologies (SaCoNet), 2014.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Sadikin, M.F., Kyas, M. Efficient Security and Privacy Protection for Emerging Smart RFID Communications. Int J Netw Distrib Comput 2, 156–165 (2014). https://doi.org/10.2991/ijndc.2014.2.3.5
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.2014.2.3.5