Improvement of the Efficient Mutual Authentication Protocol for Passive RFID Tags (EMAP)

Authors

  • MohammadReza Mehrabani * PHD, Electrical Engineering, IUST
  • Soosan Sadegha Dept. of Pharmaceutics, Faculty of Pharmacy, Tehran University of Medical Sciences, Tehran, Iran

DOI:

https://doi.org/10.59615/ijie.1.3.1

DOR:

https://dorl.net/dor/20.1001.1.27831906.2021.1.3.1.7

Keywords:

Radio frequency identification (RFID), security, privacy, authentication, confidentiality

Abstract

Radio Frequency Identification (RFID) system is a wireless automatic identification using low-cost RFID tags. Promotion of privacy and security in RFID systems has been considered essential due to their usage in everyday life. In 2012, Guo-Rui Li et al. Proposed a new Efficient Mutual Authentication Protocol for passive RFID (EMAP), that providing confidentiality, un-traceability, and efficiency. In addition to proving the security problems of the EMAP method, this paper has presented a novel method to improve this weak point.

Downloads

Download data is not yet available.

References

• Abugabah, A., Nizamuddin, N., & Abuqabbeh, A. (2020). A review of challenges and barriers implementing RFID technology in the Healthcare sector. Procedia Computer Science, 170, 1003-1010. Doi: https://doi.org/10.1016/j.procs.2020.03.094

• Burmester, M., & Munilla, J. (2014). Pre vs post state update: Trading privacy for availability in RFID. IEEE Wireless Communications Letters, 3(3), 317-320. Doi: https://doi.org/10.1109/WCL.2014.032814.140043

• Frith, J. (2019). A billion little pieces: RFID and infrastructures of identification. MIT Press.

• Kitsos, P., & Zhang, Y. (2008). RFID security (Vol. 233). Springer.

• Li, G.-R., Wang, Y., Wang, C.-R., & He, J.-S. (2012). Emap: An efficient mutual authentication protocol for passive RFID tags. International Journal of Automation and Computing, 9(1), 108-112. Doi: https://doi.org/10.1007/s11633-012-0623-7

• Mehrabani, M., & Sadegha, S. (2021). Security Analysis and Improvement of Wei-Chi Ku and Yi-Han Chen’s RFID protocol. International Journal of Innovation in Engineering, 1(2), 73-83. Doi: https://doi.org/10.52547/ijie.1.2.73

• Namin, M. E., Hosseinzadeh, M., Bagheri, N., & Khademzadeh, A. (2018). A secure search protocol for lightweight and low-cost RFID systems. Telecommunication Systems, 67(4), 539-552. Doi: https://doi.org/10.1007/s11235-017-0351-y

• Nozari, H., Fallah, M., & Szmelter-Jarosz, A. (2021). A conceptual framework of green smart IoT-based supply chain management. International Journal of Research in Industrial Engineering, 10(1), 22-34. Doi: https://doi.org/10.22105/riej.2021.274859.1189

• Paise, R.-I., & Vaudenay, S. (2008). Mutual authentication in RFID: security and privacy. Proceedings of the 2008 ACM symposium on Information, computer and communications security, doi: https://doi.org/10.1145/1368310.1368352

• Ranasinghe, R. N. D., & Yu, G. Z. (2017). RFID/NFC device with embedded fingerprint authentication system. 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), doi: https://doi.org/10.1109/ICSESS.2017.8342911

• Zhuang, X., Zhu, Y., Chang, C.-C., & Peng, Q. (2018). Security issues in ultralightweight RFID authentication protocols. Wireless Personal Communications, 98(1), 779-814. Doi: https://doi.org/10.1007/s11277-017-4895-7

Downloads

Published

2021-10-07

How to Cite

Mehrabani, M., & Sadegha, S. (2021). Improvement of the Efficient Mutual Authentication Protocol for Passive RFID Tags (EMAP). International Journal of Innovation in Engineering, 1(3), 1–7. https://doi.org/10.59615/ijie.1.3.1

Issue

Section

Original Research