With the technological advances in the areas of Machine-To-Machine (M2M) and\nDevice-To-Device (D2D) communication, various smart computing devices now integrate a set\nof multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures,\niris scanners, etc., to infer the environmental status. These devices are generally identified using\nradio-frequency identification (RFID) to transfer the collected data to other local or remote objects over\na geographical location. To enable automatic data collection and transition, a valid RFID embedded\nobject is highly recommended. It is used to authorize the devices at various communication phases.\nIn smart application devices, RFID-based authentication is enabled to provide short-range operation.\nOn the other hand, it does not require the communication device to be in line-of-sight to gain server\naccess like bar-code systems. However, in existing authentication schemes, an adversary may capture\nprivate user data to create a forgery problem. Also, another issue is the high computation cost. Thus,\nseveral studies have addressed the usage of context-aware authentication schemes for multimedia\ndevice management systems. The security objective is to determine the user authenticity in order to\nwithhold the eavesdropping and tracing. Lately, RFID has played a significant for the context-aware\nsensor management systems (CASMS) as it can reduce the complexity of the sensor systems, it can be\navailable in access control, sensor monitoring, real time inventory and security-aware management\nsystems. Lately, this technology has opened up its wings for CASMS, where the challenging issues\nare tag-anonymity, mutual authentication and untraceability. Thus, this paper proposes a secure\nhash-based RFID mechanism for CASMS. This proposed protocol is based on the hash operation with\nthe synchronized secret session-key to withstand any attacks, such as desynchronization, replay and\nman-in-the-middle. Importantly, the security and performance analysis proves that the proposed\nhash-based protocol achieves better security and performance efficiencies than other related schemes.\nFrom the simulation results, it is observed that the proposed scheme is secure, robust and less\nexpensive while achieving better communication metrics such as packet delivery ratio, end-to-end\ndelay and throughput rate.
Loading....