Design and Implementation of RFID Authentication Protocol based on Simple Symmetric Key (SSK) algorithm
Prakash Kuppuswamy1, Peer Mohamed Appa M A Y2, Saravana Raju3

1Dr Prakash Kuppuswamy, Department of Computer Engineering & Networks, Jazan University, USA.
2Peer Mohamed Appa M A Y, Assistant Professor, Computer Science and Engineering Department in Francis Xavier Engineering College, Tamilnadu, India.
3Dr Saravana Raju, Department of Computer Science & Engineering in Jazan University, USA.
Manuscript received on February 12, 2020. | Revised Manuscript received on February 21, 2020. | Manuscript published on March 30, 2020. | PP: 437-442 | Volume-8 Issue-6, March 2020. | Retrieval Number: F7131038620/2020©BEIESP | DOI: 10.35940/ijrte.F7131.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: RFID uses radio frequency waves to transfer data using components such as tag, the reader and back-end server for device identification. Radio Frequency Identification technology (RFID) providing unique identification and tracking any device that has a tag attached to safeguard the products and protect from unauthorized users. There are many kinds of protocols to resolve these problems have been researched. Though, the security, cost, time and task of RFID are accountable to identify the feasible authentication protocol according to the business environment. In this research article, we proposed new authentication protocol as a method to protect privacy, especially for affordable cost and functionalities and have limited power consumption, memory and effective security process. The proposed protocol called as simple symmetric key (SSK) algorithm using random integers based on modulo 37. The proposed authentication protocol is secure against spoofing and replay attack and also it is suitable to support distributed database environment.
Keywords: Authentication, AES, DES, RFID, Security, SSK etc.,
Scope of the Article: RFID Network and Applications.