Wireless Protocols for Anti Cloning and Security
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2013, Vol 1, Issue 5
Abstract
RFID system (Radio-Frequency Identification) is a technology for automated identification of objects and people. Human beings are smart enough to identify an object under a variety of challenge circumstances. RFID systems are emerging as one of the most pervasive computing technologies. But there are still a large number of problems that are to be addressed. One of the fundamental issues still to be addressed is privacy, which concludes association threat, location threat, preference threat, constellation threat, transaction threat, action threat and breadcrumb threat (Kim, J., Yang, C, Jeon, J,2007). Misbehaviours of both readers and tags will lead to attacks to the system. The common attacks on the readers, tags and the air interface between them comprise: Tracking or Tracing, Tamper, Clandestine Scanning, Counterfeit Tags, Cloning Tags, Eavesdropping, Replay, man-in-the-middle attack, Spoofing, Differential power analysis, Timing Attacks, Denial of Service, Physical Attacking and so on (P. Cuenca and L. OrozcoBarbosa, 2006.),(Kim, J., Yang, C, Jeon, J, 2007). Due to scarceness of resources most of the proposed protocols were designed using symmetric key cryptographic algorithms. However, it has been shown that it is inevitable to use publickey cryptographic algorithms to satisfy these requirements. A number of mechanisms have been devised to overcome the problems related to security and privacy issue of RFID systems. In this paper we propose three anonymous RFID authentication protocols and prove that they are secure in the traditional cryptographic framework. Our model allows most of the threats that apply to RFIDs systems including, denial of service, impersonation, malicious traceability, information leakage through power analysis and active man-in-the middle attacks. Our protocols are efficient and scalable.
Authors and Affiliations
Saurabh Gupta| Research Scholar - Department of Information Technology, MIT Muzaffarpur, India, saurabhg.mit@gmail.com, Dr. R. K. Singh| Head – Department of Physics, G. P. Darbhanga, India, Dr. K. B. Singh| Head- Department of Information Technology, MIT, Muzaffarpur, India
Analysis of Sandwich Beam
Sandwich beams are composite systems having high stiffness-to-weight and Strength-toweight ratios and are used as light weight load bearing components. The use of thin, strong skin sheets adhered to thicker, lightweig...
Simulation and Application of Maximum Power Tracking Scheme in a Novel Excitation Synchronous Wind Power Generator (ESWPG) by using Fuzzy Logic Controller
This paper proposes a novel excitation synchronous wind power generator (ESWPG) with a maximum power tracking scheme by using Fuzzy Logic Controller (FLC). The excitation synchronous generator and servo motor rotor s...
Identity Systematizing Conviction Model For Peer To Peer Systems
A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links --the union of which form an arbitrary graph. The routers are free to move randomly and o...
Enhanced Overlay routing With Efficient Key Distribution in Network
We demonstrate the issue of secure routing utilizing weighted coordinated graphs and propose a boolean linear programming (LP) issue to locate the ideal way. Though the way that the answers for boolean LP issues are...
A Novel Approach of Privacy Preserving Data With Anonymizing Tree Structure
Data anonymization techniques have been proposed in order to allow processing of personal data without compromising user’s privacy. the data management community is facing a big challenge to protect personal inform...