Wireless Protocols for Anti Cloning and Security

Abstract

RFID system (Radio-Frequency Identification) is a technology for automated identification of objects and people. Human beings are smart enough to identify an object under a variety of challenge circumstances. RFID systems are emerging as one of the most pervasive computing technologies. But there are still a large number of problems that are to be addressed. One of the fundamental issues still to be addressed is privacy, which concludes association threat, location threat, preference threat, constellation threat, transaction threat, action threat and breadcrumb threat (Kim, J., Yang, C, Jeon, J,2007). Misbehaviours of both readers and tags will lead to attacks to the system. The common attacks on the readers, tags and the air interface between them comprise: Tracking or Tracing, Tamper, Clandestine Scanning, Counterfeit Tags, Cloning Tags, Eavesdropping, Replay, man-in-the-middle attack, Spoofing, Differential power analysis, Timing Attacks, Denial of Service, Physical Attacking and so on (P. Cuenca and L. OrozcoBarbosa, 2006.),(Kim, J., Yang, C, Jeon, J, 2007). Due to scarceness of resources most of the proposed protocols were designed using symmetric key cryptographic algorithms. However, it has been shown that it is inevitable to use publickey cryptographic algorithms to satisfy these requirements. A number of mechanisms have been devised to overcome the problems related to security and privacy issue of RFID systems. In this paper we propose three anonymous RFID authentication protocols and prove that they are secure in the traditional cryptographic framework. Our model allows most of the threats that apply to RFIDs systems including, denial of service, impersonation, malicious traceability, information leakage through power analysis and active man-in-the middle attacks. Our protocols are efficient and scalable.

Authors and Affiliations

Saurabh Gupta| Research Scholar - Department of Information Technology, MIT Muzaffarpur, India, saurabhg.mit@gmail.com, Dr. R. K. Singh| Head – Department of Physics, G. P. Darbhanga, India, Dr. K. B. Singh| Head- Department of Information Technology, MIT, Muzaffarpur, India

Keywords

Related Articles

Eco-Physiological Studies On Fox Sagar Lake With Reference To Water Quality

The present paper deals with the ecological studies on Fox Sagar lake with reference to pollution. For this purpose both physicochemical and biological parameters were analysed. Fox Sagar lake is famous for its natura...

Forecast-Founded Haze Bandwidth And Cost Decrease Scheme

In last couple of years there huge increase in the usage cloud computing because cloud computing is emerging style of IT-delivery in which applications, data and resources are rapidly provisioned provided as standard...

Compressed Sensing Based Computed Tomography Image Reconstruction

In computed tomography (CT), an important objective is to reduce radiation dose without degrading image quality. The radiation exposure from CT scan will make severe problem in humans. This has high risk in the case...

MODELLING AND SIMULATION OF LOSSLESS DAMPING REDUCTION BY VECTOR CONTROLLED AC MOTOR DRIVE WITH AN EFFICIENT LC FILTER

In this paper Active damping technique is used to damp out the unwanted resonant frequency oscillations and proposed for lossless damping of vectorcontrolled ac drives with an efficient LC-Filter. This paper mainly co...

Closed Loop Fuzzy Logic Control of High Voltage Gain Interleaved Boost Converter fed 3-Ï• BLDC Motor Drive

This paper presents Brush Less DC Motor (BLCDM) driven by an efficient closed loop fuzzy logic based high voltage gain interleaved boost converter. The functioning of the high voltage gain interleaved boost converter...

Download PDF file
  • EP ID EP16226
  • DOI -
  • Views 366
  • Downloads 19

How To Cite

Saurabh Gupta, Dr. R. K. Singh, Dr. K. B. Singh (2013). Wireless Protocols for Anti Cloning and Security. International Journal of Science Engineering and Advance Technology, 1(5), 103-110. https://europub.co.uk/articles/-A-16226