Authors: Bhanu Chander; Kumaravelan Gopalakrishnan
Addresses: Department of Computer Science and Engineering, Pondicherry University, Pondicherry, 609605, India ' Department of Computer Science and Engineering, Pondicherry University, Pondicherry, 609605, India
Abstract: With the progressive and continuous development in micro-electro-mechanical technologies, intelligent internet of things (IoT), and the propagation of 5G communication technology, the security of resource-controlled IoT appliances like RFID-based TMIS applications has received predominant attention. Typically, wireless communication channel is utilised among tag, reader and back-end server, which is easily vulnerable to various intimidations such as spoofing, DoS, replay, and de-synchronisation. Therefore, the privacy and integrity of the communicated information cannot be guaranteed. Researchers proposed various symmetric and asymmetric encryptions, hash functions, key management, CRC, and ECC-based techniques for solving privacy and integrity issues of RFID authentication for TMIS systems. In the related work, we discussed up-to-date RFID-based authentication for TMIS systems. However, most do not solve formal, informal attacks; moreover, they suffer from communication and computational complexities. Thus, this manuscript describes an enhanced mutual authentication practice for RFID components with hash and random functions. We further demonstrate that the proposed scheme offers all the desired security requirements by verifying AVISPA, Scyther, and GNY logic.
Keywords: radio frequency identification; RFID tag; telecare medicine information system; TMIS; authentication; security analysis; Scyther and AVISPA tools; GNY logic precision.
International Journal of Information and Computer Security, 2022 Vol.18 No.3/4, pp.383 - 405
Received: 31 Mar 2021
Accepted: 05 Aug 2021
Published online: 05 Sep 2022 *