An Authentication Protocol Based on Combined RFID-Biometric System
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 4
Abstract
Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, …). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms the secrecy, the authentication and the privacy. Our protocol requires a PRNG (Pseud-Random Number Generator), a robust hash function and Biometric hash function. The Biometric hash function is used to optimize and to protect biometric data. For Security analysis of protocol proposed, we will use AVISPA and SPAN tools to verify the authentication and the secrecy.
Authors and Affiliations
Noureddine Chikouche , Foudil Cherif , Mohamed Benmohammed
Qos-based Computing Resources Partitioning between Virtual Machines in the Cloud Architecture
Cloud services have been used very widely, but configuration of the parameters, including the efficient allocation of resources, is an important objective for the system architect. The article is devoted to solving the p...
Collaborative System Model for Dynamic Planning of Supply Chain
The business need to be structured as an integrated supply chain pushes companies to make use of a greater level of co-operation and coordination. As a means of coordination, negotiation has been chosen in this work. The...
Combating the Looping Behavior: A Result of Routing Layer Attack
Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them a...
DESIGN AND APPLICATION OF QUEUE-BUFFER COMMUNICATION MODEL IN PNEUMATIC CONVEYING
In order to communicate with a PLC (Programmable Logic Controller) flexibly and freely, a data communication model based on the PLC's free port is designed. In the structure of the model, a distributed data communication...
VoIP QoS Analysis over Asterisk and Axon Servers in LAN Environment
Voice over IP (VoIP) is a developing technology and a key factor in both the emerging cyberspace engineering and also an accomplishment to set up its position in the telecom industry. VoIP technology is based on internet...