SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags

نویسنده

  • Rama N
چکیده

RFID systems that employ passive RFID tags, are run using lightweight protocols. The Gossamer protocol is a case in point. However, it is found that the Gossamer protocol uses rather simple operations, in order to ensure that the protocol is lightweight. This raises security concerns. A protocol based on the Sign/Logarithm number system to make it power-efficient, and the efficient use of one-dimensional convolution to secure the transmission of the tag’s ID value, is proposed. Thus, a protocol that is power-efficient and more secure than the Gossamer protocol is proposed. Further, this protocol may be used even in the basic passive tag, which has minimal processing capability and no power source of its own. KeywordsRFID, Gossamer, Sign/Logarithm number system, mutual authentication protocol, Convolution

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags

In this paper, we present a passive attack for finding out the secrets used in MAP (Minimalist Mutual Authentication Protocol), which is an authentication protocol between RFID tags and RFID readers. We describe an algorithm that breaks the protocol after eavesdropping a few consecutive rounds of communication. After two eavesdropped runs of the protocol, the attacker can learn the identificati...

متن کامل

RFID Security Using Lightweight Mutual Authentication And Ownership Transfer Protocol

In recent years, radio frequency identification technology has moved into the mainstream applications that help to speed up handling of manufactured goods and materials. RFID tags are divided into two classes: active and passive. Active tag requires a power source that’s why its cost is more than passive tags. However, the low-cost RFID tags are facing new challenges to security and privacy. So...

متن کامل

A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application

Mobile RFID applications combine RFID technologies and mobile device to create a new convenient application area. However, most of the applications suffer from the security issues due to insecure communication channels among tags, readers and servers. In 2012, Zhou et al. proposed an ECC-based mutual authentication protocol to promote mobile RFID applications security. However, we found their p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010