A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems

With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures, iris scanners, etc., to infer the environmental status. These devices are generally identified using radio-frequency identification (RFID) to transfer the collected data to other local or remote objects over a geographical location. To enable automatic data collection and transition, a valid RFID embedded object is highly recommended. It is used to authorize the devices at various communication phases. In smart application devices, RFID-based authentication is enabled to provide short-range operation. On the other hand, it does not require the communication device to be in line-of-sight to gain server access like bar-code systems. However, in existing authentication schemes, an adversary may capture private user data to create a forgery problem. Also, another issue is the high computation cost. Thus, several studies have addressed the usage of context-aware authentication schemes for multimedia device management systems. The security objective is to determine the user authenticity in order to withhold the eavesdropping and tracing. Lately, RFID has played a significant for the context-aware sensor management systems (CASMS) as it can reduce the complexity of the sensor systems, it can be available in access control, sensor monitoring, real time inventory and security-aware management systems. Lately, this technology has opened up its wings for CASMS, where the challenging issues are tag-anonymity, mutual authentication and untraceability. Thus, this paper proposes a secure hash-based RFID mechanism for CASMS. This proposed protocol is based on the hash operation with the synchronized secret session-key to withstand any attacks, such as desynchronization, replay and man-in-the-middle. Importantly, the security and performance analysis proves that the proposed hash-based protocol achieves better security and performance efficiencies than other related schemes. From the simulation results, it is observed that the proposed scheme is secure, robust and less expensive while achieving better communication metrics such as packet delivery ratio, end-to-end delay and throughput rate.


Introduction
In the recent past, the development of smart computing devices in the Internet of Things (IoT) has grown exponentially [1,2]. These devices share the geo-location of physical objects with other systems. They are widely used in smart infrastructure to build the smart city features such as smart eHealthcare, storage capabilities, it is more complicated to apply the expensive cryptographic operations in lowpower RFID systems. Moreover, the expensive computations have slowed the development of RFID technologies [16][17][18]. Most significantly, adoptive RFID technologies cannot properly exploit the authentication process to enhance their security-level. In order to restrict malicious activities, the source messages should be prevented from fake broadcasting. It is noted that the physical security of RFID tags should be proactively secured to prevent unauthorized access. Moreover, the attackers then would not be able to track the previous user tag information to impersonate a legitimate user. Thus, this paper introduces a novel hash-based RFID mechanism using synchronized secret session key value and its objective is to: (1) Provide user privacy; (2) Reduce the power consumption; (3) Reduces cost of the tag; and (4) Offer mutual authentication, tag-anonymity and traceability.
The remaining sections of this paper are organized as follows: Section 2 discusses the research background, including communication models, motivation and enabling technologies and its key objectives; Section 3 presents context-aware sensor management systems; Section 4 proposes a novel hash-based RFID mutual authentication protocol; Section 5 presents an informal security and performance analysis; Section 6 demonstrates the experimental analysis using NS-3; and finally Section 7 concludes the research work.

System Models
This section discusses the system communication models and research motivation to explain the key factors of hash-based RFID authentication.

System Communication Model
A basic RFID system consists of three communication entities, namely the receiver (reader), transponder (tag) and a backend database such as a server to store and analyze the data. In general, the RFID tags are attached on physical objects that locate and identify physical things among thousands of objects. Each RFID has a small built-in antenna that attaches a microchip with limited memory space to store the identities of data objects [19]. The RFID reader is basically used as a scanner that interrogates the tag information existing in scanning system environment. A server such as a backend database strategically handles the massive amount of generated data for data processing and storage, offering an influential and necessary processing capability and storage space. Furthermore, it operates the system processor to read, manage, control and store the tag data from the attached tags in the RFID reader as illustrated in Figure 1.

Research Motivation
RFID is used to collect the static informational data; however tags cannot extract dynamic informational data, like humidity, acceleration and temperature. On the other hand, sensor systems nowadays are capable to collect all kind of dynamic information data to fill communication gaps

Research Motivation
RFID is used to collect the static informational data; however tags cannot extract dynamic informational data, like humidity, acceleration and temperature. On the other hand, sensor systems nowadays are capable to collect all kind of dynamic information data to fill communication gaps using RFID systems. Therefore, the RFID system is integrated with the sensors to collect and monitor the environmental status related to the informational data items. This research refers to a device that integrates a RFID tag and a sensor called Sensing RFID (SRFID). The system device tries to integrate the sensor into an RFID tag to deal with the several challenging issues in large-scale or open-loop systems. The first challenge of the system is the use of non-smart sensors that have specific application requirements for different types of sensors. Moreover, the system models and its related sensor parameters of devices produced by different manufacturers have different types of functionality, even if the sensors are of the same nature.
The following issues are identified, as and when the sensors of the SRFID are configured in a standard way for off-the-shelf readers: (1) SRFID has unique differentiation by the readers; (2) The sensor parameters have automatic sensor recognition features; and (3) The parameters related to the sensor have effective configurations. When the sensor collects the sampling datasets to transfer them to the reader, the datasets, such as parsing and identification, represent additional problems. The identification problems are related to the description of the sensors. The objective of the sensors is to provide interoperability between SRFID tags and readers/host applications, though general purpose sensors, such as analog and digital devices do not have such self-descriptive functions and capability to define the sensors. The second challenge of the system is the data storage related to the SRFID tag. The sensors are diverse in nature, and thus may vary for every SRFID tag. Therefore, the data storage method needs features such as simplicity, flexibility and efficiency. The reader interfaces the various sensors with the application programming interface (API) to access and control all related data of the SRFID tag. Besides, this data storage method allows convenient access to append/remove the sensor from the tag.
The third challenge of the system is the sensor sampling mechanism and it is used to set up an operational mechanism to possess the needed functions to configure, collect and parse the sampling data. To overcome the above challenging problems, this paper focuses on the integral components of an active SRFID tag, namely a self-descriptive sensor, a data storage sensor and an operational sampling sensor. In addition, this paper is restricted to the self-descriptive sensor in consideration of the Plug and Play (PnP) feature [20,21]. In RFID, the issues such as security and privacy are primarily focused on physical [22] as well as security authentication mechanisms [23][24][25]. As the physical mechanism incurs more additional cost, security authentication schemes are very attractive in practical use. Chien et al. [23], Kim et al. [24,25] and Hajny et al. [12] have studied cross-examination. Since the authentication schemes [12,[23][24][25] do not validate the secret session key of the tag and reader, they are susceptible to various kinds of malicious attacks, such as eavesdropping and tracing, replay, man-in-the-middle and desynchronization. Besides, they do not comply with the security properties of tag anonymity and untraceability.

Enabling Technologies and Its Key Objectives
The Internet has become more prevalent for social-media networks and various emerging technologies such as wireless sensor networks (WSN), Internet of Things (IoT), cloud computing (CC) and big-data management. These technologies enable people to communicate and share their interests in several ways. As a result, technological advances create new application models and business opportunities to offer comfort, safety, and more computational efficiency. Of late, CC and IoT have been more relevant for industry and academic collaboration. Ashton presented the IoT concept [26] that defines the purpose of physical objects and wireless channels [27]. McCarthy [28] introduced the cloud computing concept that derives a large-scale distributed system to drive several economic benefits such as virtualization, data storage, and computation power.
IoT and CC are service computing platforms that allow object interconnection, including personal and sensitive data, over wireless channels [29][30][31]. The collective data of physical objects or sensors is generally stored on a cloud-server [32][33][34][35]. However, features such as security and privacy are highly demanded to prevent malicious activities [36]. Ferrag et al. [37] and El-Hajj et al. [38] discussed the IoT requirements, including authentication, authorization, confidentiality, privacy and message integrity to signify the importance of node protection. Therefore, to fulfill the standard requirements of an authentication protocol, a suitable mechanism is highly recommended. It can verify the user identities to determine whether he/she is vulnerable or not on open networks [37,38]. Due to network vulnerabilities and Internet security, user authentication plays a crucial role [39].
From the above discussion, the important aspects of RFID authentication protocols have been studied for different IoT environments including industrial management, payment schedules, and several emergency systems. These environments use RFID-tags to achieve more computation power, speed, and physical object robustness than traditional barcode systems. Moreover, technological advancements have addressed several security issues for RFID-based security systems. Concerning the property of untraceability, several RFID-based authentication protocols have simply traded the privacy for the purpose of better system performance. Most of the authentication protocols merely encrypt the tag identity of RFID using cryptographic functions. In case of verification, the reader or back-end server is expected to perform an extensive operation to authorize the RFID-tag, resulting in poor system performance.
Of late, several authentication protocols have been proposed for low-cost RFID systems [40][41][42][43][44][45][46][47]. However, they are reported to have high execution cost, security weaknesses, and vulnerabilities. Chien et al. [40] presented a strong authentication and strong integrity (SASI) protocol that is based on ultra-lightweight authentication. However, their protocol is highly prone to tag tracing and desynchronization attacks [41][42][43]. To address the critical issues of SASI, Peris-Lopez et al. [44] introduced the Gossamer protocol. Unfortunately, it could not resist desynchronization attacks [45]. Of late, Fan et al. [46] presented an ultra-lightweight authentication for mobile commerce applications including cryptographic operations such as XOR, shift and addition modulo operations, but Aghili and Mala [47] have proven that the Fan et al. scheme cannot resist physical and reader impersonation attacks. Table 1 summarizes the challenging issues of existing RFID-based authentication protocols. To address the above issues, this paper presents a novel hash-based RFID mechanism using synchronized secret session key values. This mechanism tactfully meets the crucial security requirements of IoT-based multimedia systems, namely mutual authentication, untraceability, and resilience to desynchronization attacks. Moreover, it has a built-in context aware management system to handle the storage parameters and thus it can reduce the additional communication cost to improve the overall system performance. Importantly, it does not perform any exhaustive search to affect the execution of back-end servers. Figure 2 shows the block diagram of the integration of a virtual TEDS system in IEEE 1451 [53]. The purpose of IEEE 1451 is to identify the parameters of non-smart sensors to access the memory where the datasets related to the TEDS are stored. The IEEE standards, namely IEEE 1451.7 [54], ISO/IEC 24753 [55] and ISO/IEC/IEEE 21451-7 [55] integrate RFID tags and sensors to specify and interface the sensor security and data structure. The standard of ISO/IEC/IEEE 24753.7 is identical to the IEEE standard of 1451.7 which specifies the model related to the application interface to integrate the RFID tag and sensor. This integration is done to execute the functional commands of the sensor application system. These standards integrate the RFID tag and sensor to develop a smart sensor system with RFID tags. However, they do not work with the integral components of existing sensors, such as analog and digital ones to act as a smart sensor system with RFID tags.  Figure 2 shows the block diagram of the integration of a virtual TEDS system in IEEE 1451 [53]. The purpose of IEEE 1451 is to identify the parameters of non-smart sensors to access the memory where the datasets related to the TEDS are stored. The IEEE standards, namely IEEE 1451.7 [54], ISO/IEC 24753 [55] and ISO/IEC/IEEE 21451-7 [55] integrate RFID tags and sensors to specify and interface the sensor security and data structure. The standard of ISO/IEC/IEEE 24753.7 is identical to the IEEE standard of 1451.7 which specifies the model related to the application interface to integrate the RFID tag and sensor. This integration is done to execute the functional commands of the sensor application system. These standards integrate the RFID tag and sensor to develop a smart sensor system with RFID tags. However, they do not work with the integral components of existing sensors, such as analog and digital ones to act as a smart sensor system with RFID tags. The sensor management system has a self-descriptive model like Sensor Web Enablement (SWE) [56][57][58][59] initiated by the Open Geospatial Consortium (OGC) to standardize the data encoding and web service interface. In addition, the OGC has built a web-based sensor model for the Sensor Modeling language (SensorML) [21]. The W3C Semantic Sensor Network (SSN) group has proposed an ontology description of SSN [22]. However, these data descriptive sensors are generally employed at the host computer/network level but not the sensor-node level. Moreover, these data descriptive methods use Extensible Markup Language (XML) that has an enormous functional format and thus this language requires an XML-Parser to consume less memory storage.

Context-Aware Sensor Management Systems
Therefore, XML files are difficult to deploy in self-descriptive/context-ware sensors to retrieve, remove and modify the sensing data. The self-descriptive/context-aware method is usually not suitable for sensor application systems, and so this paper proposes a novel strategy to back up the sensing data in the SRFID tags to protect the exchanged information. The sensor management system has a self-descriptive model like Sensor Web Enablement (SWE) [56][57][58][59] initiated by the Open Geospatial Consortium (OGC) to standardize the data encoding and web service interface. In addition, the OGC has built a web-based sensor model for the Sensor Modeling language (SensorML) [21]. The W3C Semantic Sensor Network (SSN) group has proposed an ontology description of SSN [22]. However, these data descriptive sensors are generally employed at the host computer/network level but not the sensor-node level. Moreover, these data descriptive methods use Extensible Markup Language (XML) that has an enormous functional format and thus this language requires an XML-Parser to consume less memory storage.
Therefore, XML files are difficult to deploy in self-descriptive/context-ware sensors to retrieve, remove and modify the sensing data. The self-descriptive/context-aware method is usually not suitable for sensor application systems, and so this paper proposes a novel strategy to back up the sensing data in the SRFID tags to protect the exchanged information.

Novel Hash-Based RFID Mutual Authentication Protocol
A novel hash-based RFID mutual authentication protocol using a secret-session key is proposed. A novel session-key sharing strategy is used to secure the communication between the reader/user and the back-end database server. Figure 3 illustrates the novel hash-based RFID mechanism. The phases of the mechanism, namely Pre-phase registration, Readers Pro-Tag request and Response, Tag Mutual Session-key Authentication, Back-end Server Key Authentication and Session-key Updating are executed to solve the challenging issues of the existing protocols, such as security, privacy and forgery. To address the issue of security, this paper uses a secret-session key as a significant feature. In addition, the session keys are subsequently generated at the back-end database server SS k → SS k−1 to update the output values of the session keys of the tag. Table 2 shows the important notations used in this paper.

Novel Hash-Based RFID Mutual Authentication Protocol
A novel hash-based RFID mutual authentication protocol using a secret-session key is proposed. A novel session-key sharing strategy is used to secure the communication between the reader/user and the back-end database server.  Figure 3 illustrates the novel hash-based RFID mechanism. The phases of the mechanism, namely Pre-phase registration, Readers Pro-Tag request and Response, Tag Mutual Session-key Authentication, Back-end Server Key Authentication and Session-key Updating are executed to solve the challenging issues of the existing protocols, such as security, privacy and forgery. To address the issue of security, this paper uses a secret-session key as a significant feature. In addition, the session keys are subsequently generated at the back-end database server SS → SS to update the output  The execution flow of the pre-phase registration are as follows: (1) The back-end database server and the tag mutually share their credentials, such as Tag-I D : I D K , one-way hashing, secret − session key : SS k in the pre-phase registration of the proposed mechanism. (2) The reader and tag have a unique random number generator to authenticate the services like role assignment. For each tag, the back-end database server collects the parameters, namely I D K , SS k , SS k−1 and assign the values. (3) SS k is the secret-session key of the current session tag k. (4) SS k−1 is the secret-session key of the previous session tag k − 1, since its initial value is set to null. (5) Data : Information of the object/role that is tagged to the back-end database server to assign the access privileges.

Phase II: Readers Pro-Tag Request and Response
(1) The reader randomly selects an integer R i to send a request to the tag.
(2) Then, the tag generates a random integer R j to compute: X = H SS k I D K R i ; Y = X H I D K R i R j ; and Z = X H Y T s1 R i , where T s1 is the current timestamp of the tag.
(3) After the computation of {X, Y, Z}, the tag sends its response message as {X, Z, T s1 } to the reader. (4) After receiving the response message {X, Z, T s1 } from the reader, the reader sends the message of response {X, Z, T s1 , R i } to the back-end server, after being added to the computational integer of R i .

Phase III: Tag Mutual Session-Key Authentication
Upon receiving/extracting the tag informational data from the database, the back-end server executes the computational following steps: (1) If (T s1 − T s2 ) > ∆T s , then the back-end server terminates the login request of the user, where T s2 is the current timestamp in the remote-server and ∆T s is the expected transmission delay.  (1) and (5) till the value of Z * i is equal to Z i from the response message of reader. If the values are equaled, then the right tag will be found. Upon receiving the appropriate-tag, the back-end server communicates the tag information to the readers to update the value of secret session-key. In addition to the computation and validation, this phase also executes the following steps to update the readers' session-key: (1) The back-end server forms a new message format as New msg = {Data U}, where Data is the information of the tag to be communicated to the reader to ensure the property of mutual authenticity. If the back-end server fails to deduce a valid right tag, then the server deduces that there is an invalid message authentication to terminate the user session. After the execution of new message New msg , the reader executes the following steps to maintain the communication: (2) The back-end server sends the new message of New msg = {Data U} to the reader.
(3) Upon receiving the new message of New msg from the back-end server, the reader excludes the parameter of Data and sends the parameter of U to the tag to maintain the communication.

Phase IV: Back-End Server Key Authentication and Session-Key Updation
Based on the message U at T s3 , the tag executes the following steps to authenticate the back-end server: (1) If (T s3 − T s2 ) > ∆T s , then the tag terminates the login request of the user, where T s3 is the current timestamp in the tag and ∆T s is the expected transmission delay. (2) Compute: U * = H Y SS k T s3 ≈ U, if the condition is valid, then the tag authenticates the back-end server to confirm that the computed hash value is identical to incur the value of U from the reader.
After the authentication of back-end server, the secret session-key SS k is updated into SS k+1 to server the communication between server and tag.

Security and Efficiency Analysis
This section focuses its discussion on the security and performance analysis by comparing the security properties and computation cost with other related protocols [12,24,25].

BAN Logic Analysis
BAN logic [60] analysis is highly preferred to signify the design process that ensures the security structure of authentication protocol when it starts to build [61]. Moreover, it is a standard way to satisfy the security features of any application system [62,63]. In general, the formal analysis model is comprised of four methods: logical procedure, common analysis, model detection and proof of theorem. This paper chooses BAN logic to verify a belief of agreements as a logical structure [64] in order to analyze the security features of proposed hash-based protocol. The proof of verification is classified into four descriptive parts that are as follows:

A) Protocol Explanation
In this part, the information processes and its related transmission parameters are briefly introduced to entail the structure of the systems where T R represents the RFID tag, R H represents the reader and B S represents the back-end server: In this part, the important assumptions of proposed hash-based protocol are listed that are defined as follows:

C) Providing Security Features
In this part, three security features are provided to validate user entities and data synchronization. The detailed user entities are as follows:

D) Proof of Security Process
The process of security proof explains the representation of A B, where A is the premise, B is the conclusion and is a symbol of meta-linguistic. From the BAN logic, the seeing rule and the (3) protocol explanation is applied to obtain: From the BAN logic, the freshness rule and the (4) protocol explanation are combined to attain: ↔ R H i.e., from (3) protocol explanation, it can be obtained as: Similarly, it can be expressed as: As a result, the first proven goal a is achieved from the given Equations (1) and (2). From the BAN logic, the seeing rule, the (2) and the (3) initial assumptions can be obtained as: From the initial assumption (1), it can be obtained as: Similarly, it can be expressed as: As a result, the second proven goal b is realized from the given Equations (3) and (4). According to the rule of message-meaning and the (2) initial assumption, it can be expressed as: New msg , T sNew , R i X,Z B S ≡ T R ∼ New msg , T sNew , R i Therefore, it can be represented as: Similarly, it can be expressed as: As a result, the third proven goal c is realized from the given Equations (5) and (6). From the above Equations (1) to (6), the security features a , b and c have claimed to be successfully verified. This ensures that the proposed hash-based protocol achieves the property of mutual authentication between the tag, the reader and the back-end server. Moreover, it ensures the security of data synchronization for the proposed hash-based protocol.

Informal Analysis
The proposed novel hash-based RFID mutual authentication protocol claims that it can provide a high-secure authentication against the most of the potential attacks, namely replay, eavesdropping and man-in-the-middle; since the proposed mechanism is based on the hashing operation and secret session-key synchronization: Mutual Authentication: The proposed novel hash-based RFID mechanism offers bilateral authentication between the communication parties. The back-end server authenticates the tag by the computation of Z * = H A H I D K R i R * j R * j T s2 on the server-side which will be validated with the received response-message Z sent by the reader. Correspondingly, the back-end server validates its authentication by the computation of U * = H Y SS k T s3 on the tag-side which will be identical with the received message U sent by the reader.
Resilient to Eavesdropping and Tracing: The proposed novel hash-based RFID mechanism is resilient to eavesdropping and tracing. As the proposed mechanism uses the random integers R i and R j and user anonymity, the threat of tracing can be prevented, so none of the messages transport the tag information twice owing to the challenge-response mechanism used by the independent session variables R i and R j . The proposed mechanism has limited hash H(.) and X-OR operations with random integers and synchronized-secret operation, therefore any threat of eavesdropping can be avoided by concealing the tag information. Hence, the proposed mechanism can successfully pass a one-way authentication step to prevent the threats, such as eavesdropping and tracing.
Resilient to Replay Attacks: The proposed novel hash-based RFID mechanism can be resilient to replay attacks. As the proposed mechanism often uses the random integers R i and R j , the authentication request is verified using U * = H Y SS k T s3 ≈ U to validate whether the current timestamp T s3 is fresh or not. After the successful validation, the confidential information will be updated within the valid time-frame. Hence, the attackers can't deduce the information shared between the reader and the tag.
Resilient to Man-in-the-Middle Attacks: As the proposed novel hash-based RFID mechanism uses the hashing and X-OR operations U = H X H I D K R i R j T s2 SS k for each message transmission, the parameters SS k , R i and R j can't be tampered with to deduce the confidential information of the tag. Hence, the proposed mechanism can be resilient to man-in-the-middle attacks.
Untraceability and Tag-Anonymity: To hide the tag information, each transaction message and update process consists of some internal parameters SS k , A and I D K and also uses the random integers R i and R j . The server can deduce the identification of the tag after the successful computation of these parameters SS k , A and I D K sent by the tag. Hence, the proposed mechanism stops an attacker from tracing the information of the tag as well as the secret session key of the communication system.
Resilient to Desynchronization Attacks: For the successful launch of desynchronization, an attacker must be able to deduce the secret session key using the related parameters SS k and SS k+1 . In the proposed novel hash-based RFID mechanism, an attacker can't infer the updated value of SS k as it is associated with the validation of Z * = H A H I D K R i R * j R * j T s2 ≈ Z. Hence, the proposed mechanism can be resilient to de-synchronization attack. Table 3 compares the security properties of various hash-based RFID protocols in which the proposed hash-based protocol is proven to be well-secured in comparison with the other hash-based RFID protocols [12,24,25]. Besides, the proposed hash-based protocol meets all the security level of context-aware sensor management systems. Hajny et al. [12] interactive flows between the tags, the reader and the back-end server, whereas Kim et al. [24,25] and Hajny et al. [12] process four and seven flows, respectively. Moreover, the results prove that the proposed hash-based protocol has less communication cost as compared to other existing protocols [12,24,25], improving the system efficiency. As a result, it is claimed that it can be preferably deployed in IoT-based multimedia systems.

Experimental Study
A powerful network simulator known as NS-3 [66] is chosen to simulate the discrete events that construct a modern network environment to investigate the communication metrics such as packet delivery ratio, end-to-end delay and throughput rate. Moreover, this tool uses both IP and non-IP to simulate the network models such as LTE-A, LTE, WiMAX etc. Importantly, it is contained in several library tools to support the required simulation functions [67]. It uses Python and C++ to build or construct the program structure. Table 5 summarizes the important parameters of the NS3 simulator. Ubuntu 16.04 LTS is preferred to construct the simulation program that is executed for 1800 s. The RFID devices are located in rectangular fashion, which equips 20 tags in a row. To realize the communication structure, the simulation has added eight consecutive rows i.e., 160 tags, where the communication distance is set to be 25 m and the distance between the device and the gateway is assumed to be 275 m Moreover, the simulation has five readers, which can randomly mobilize with a constant speed equal to 1 m/s. The transmission range of a reader and a tag is set to be 200 m and 70 m, respectively [68]. The network environment known as IEEE 802.11 is adopted to test the above scenario. The payload is set to be 48 bytes that randomly sends and receives the information for every 4 s. This scenario is tactfully constructed to examine the communication metrics namely packet delivery ratio, end-to-end delay and throughput rate, respectively.

Packet Delivery (PR) Ratio
By definition, packet delivery ratio is the ratio between the number of packets sent and the number of packets received successfully by the RFID reader. Most importantly, it is crucial to examine the performance of communication networks.
From Figure 4, it is observed that the packet delivery ratio declines when the number of devices starts to increase. Even if the number of tags reaches 100, the proposed hash-based protocol records less transmission delay between the holding reader and the communication tags in comparison with other existing schemes [12,24,25]. In addition, the result reveals the drawbacks of congestion in low-power wireless environments, where the energy is highly needed to send the data packets. Significantly, it is recorded that the energy spent is dramatically increased when there is more distance between the devices. As a result, a significant value is recommended to calculate a threshold limit, whereby the server can abort a long-distance communication to achieve better performance and device lifetime.

Packet Delivery (PR) Ratio
By definition, packet delivery ratio is the ratio between the number of packets sent and the number of packets received successfully by the RFID reader. Most importantly, it is crucial to examine the performance of communication networks.

End-To-End (E2E) Delay
End-to-end (E2E) delay calculates the average time taken to send and receive the packet between the readers and the tags. It can be defined as the transmission delay, where i is the number of message transmissions, PT r i and PT s i are the timestamp set for the successful packet sent and received i.e., i-th packet transmission: From Figure 5, it is noted that there is a substantial delay when the number of devices starts to increase. Due to repetitive process, more devices are trying to transmit the data packets whereby the high network congestion and distance connectivity is recorded. However, the proposed hash-based scheme has less transmission delay i.e., ∼ 0.174 s in comparison with other authentication schemes [12,24,25].  [12,24,25]. In addition, the result reveals the drawbacks of congestion in lowpower wireless environments, where the energy is highly needed to send the data packets. Significantly, it is recorded that the energy spent is dramatically increased when there is more distance between the devices. As a result, a significant value is recommended to calculate a threshold limit, whereby the server can abort a long-distance communication to achieve better performance and device lifetime.

End-To-End (E2E) Delay
End-to-end (E2E) delay calculates the average time taken to send and receive the packet between the readers and the tags. It can be defined as the transmission delay, where i is the number of message transmissions, PT and PT are the timestamp set for the successful packet sent and received i.e., i-th packet transmission: From Figure 5, it is noted that there is a substantial delay when the number of devices starts to increase. Due to repetitive process, more devices are trying to transmit the data packets whereby the high network congestion and distance connectivity is recorded. However, the proposed hash-based scheme has less transmission delay i.e., ~0.174 s in comparison with other authentication schemes [12,24,25].

Throughput Rate (TR)
Throughput rate defines the successful transmissions between the server and the reader in ≈ 1 m s ⁄ . It can be generally calculated using the following equation, where T is the complete execution time, Q quantity of packet received at the given i-th interval and L is the length of transmission i-th interval packet: From Figure 6, it is found that the proposed hash-based scheme shows better packet deliverability than other authentication schemes [12,24,25]. It is also evident that the throughput rate naturally declines when the packet deliver ratio is low.

Throughput Rate (TR)
Throughput rate defines the successful transmissions between the server and the reader in ≈ 1 m/s. It can be generally calculated using the following equation, where T W is the complete execution time, Q R I quantity of packet received at the given i-th interval and L i is the length of transmission i-th interval packet: From Figure 6, it is found that the proposed hash-based scheme shows better packet deliverability than other authentication schemes [12,24,25]. It is also evident that the throughput rate naturally declines when the packet deliver ratio is low.

Conclusions
In the past, computing devices have evolved for smart networking that manage sensitive data securely to improve the functioning of the IoT and communication systems. As the device interacts with its own community or infrastructure to collect environmental data over open networks, a secure authentication protocol is highly needed to prevent the unauthorized access. Therefore, a hash-based RFID authentication has been presented as a novel approach for controlling the physical access to devices. It can be useful for the various context-ware sensor management systems. While fixing the device identification and verification, the proposed hash-based RFID mechanism validates the identifier privately using a synchronized secret session key value to strengthen the privacyenhancement of CASMS. The proposed mechanism uses hashing operations and secret session-key synchronization between the backend server and tag to meet all the security levels of CASMS, namely mutual authentication, untraceability and tag-anonymity. Moreover, the proposed mechanism is resilient to attacks, such as desynchronization, replay and man-in-the-middle. From our informal security and performance analysis, the proposed hash-based protocol achieves better efficiencies than other RFID authentication protocols. Also, the simulation using NS3 shows that the proposed protocol achieves better communication metrics such as packet delivery ratio, end-to-end delay and throughput rate in comparison with other existing schemes [12,24,25]. In the future, an optimized user verification algorithm will be proposed to reduce the operational execution time of the authentication protocol. Funding: This research received no external funding. Figure 6. Throughput rate vs. number of sensor nodes.

Conclusions
In the past, computing devices have evolved for smart networking that manage sensitive data securely to improve the functioning of the IoT and communication systems. As the device interacts with its own community or infrastructure to collect environmental data over open networks, a secure authentication protocol is highly needed to prevent the unauthorized access. Therefore, a hash-based RFID authentication has been presented as a novel approach for controlling the physical access to devices. It can be useful for the various context-ware sensor management systems. While fixing the device identification and verification, the proposed hash-based RFID mechanism validates the identifier privately using a synchronized secret session key value to strengthen the privacy-enhancement of CASMS. The proposed mechanism uses hashing operations and secret session-key synchronization between the backend server and tag to meet all the security levels of CASMS, namely mutual authentication, untraceability and tag-anonymity. Moreover, the proposed mechanism is resilient to attacks, such as desynchronization, replay and man-in-the-middle. From our informal security and performance analysis, the proposed hash-based protocol achieves better efficiencies than other RFID authentication protocols. Also, the simulation using NS3 shows that the proposed protocol achieves better communication metrics such as packet delivery ratio, end-to-end delay and throughput rate in comparison with other existing schemes [12,24,25]. In the future, an optimized user verification algorithm will be proposed to reduce the operational execution time of the authentication protocol.