Design and Implementation of RFID Authentication Protocol based on Simple Symmetric Key (SSK) algorithm

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

RFID uses radio frequency waves to transfer data using components such as tag, the reader and back-end server for device identification. Radio Frequency Identification technology (RFID) providing unique identification and tracking any device that has a tag attached to safeguard the products and protect from unauthorized users. There are many kinds of protocols to resolve these problems have been researched. Though, the security, cost, time and task of RFID are accountable to identify the feasible authentication protocol according to the business environment. In this research article, we proposed new authentication protocol as a method to protect privacy, especially for affordable cost and functionalities and have limited power consumption, memory and effective security process. The proposed protocol called as simple symmetric key (SSK) algorithm using random integers based on modulo 37. The proposed authentication protocol is secure against spoofing and replay attack and also it is suitable to support distributed database environment.

Cite

CITATION STYLE

APA

Kuppuswamy, D. P., M A Y, P. M. A., & Raju, D. S. (2020). Design and Implementation of RFID Authentication Protocol based on Simple Symmetric Key (SSK) algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 437–442. https://doi.org/10.35940/ijrte.f7131.038620

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free