An Improved Novel Key Management Protocol for RFID Systems

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 An Ultra-lightweight Authentication Protocol in RFID Speaker: 魏家惠.
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
RFID Security and Privacy Part 2: security example.
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols Li Lu, Lei Hu State Key Lab of Information Security, Graduate School.
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions Shaoying Cai 1 Yingjiu Li 1 Tieyan Li 2 Robert H. Deng 1 1 Singapore.
Giuseppe Bianchi Warm-up example 1 found on a real paper! Warm-up example 1 found on a real paper!
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
RFID SECURITY.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Security of the Internet of Things: perspectives and challenges
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
BY S.S.SUDHEER VARMA (13NT1D5816)
Towards 5G AKE: The security and privacy of 3G/4G AKA
Cryptography: an overview
Intrusion Tolerant Architectures
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
By:- Kan Yang, Xiaohua Jia
OAuth WG Conference Call, 11th Jan. 2013
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
A secure and traceable E-DRM system based on mobile device
Cryptographic Hash Function
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
CMSC 414 Computer and Network Security Lecture 15
A Wireless LAN Security Protocol
CS480 Cryptography and Information Security
Sindhusha Doddapaneni
Advanced Science and Technology Letters
Zahra Ahmadian Recursive Linear and Differential Cryptanalysis of Ultra-lightweight Authentication Protocols Zahra Ahmadian
Efficient Public-Key Distance Bounding
Privacy Preserving Ranked Multi-Keyword
Presenter: Patrick N. zwane Advisor: Dr. Kai-Wei Kevin Ke 21/09/2018
Efficient CRT-Based RSA Cryptosystems
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
Revisting Unpredictability-Based RFID Privacy Models
The Secure Sockets Layer (SSL) Protocol
Security and Privacy in Pervasive/Ubiquitous Computing Systems
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Randomized PRF Tree Walking Algorithm for Secure RFID
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
Security Implementation Using Present-Puffin Protocol
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Afzal Hussain Mohammad and Abdul Ahad Yahiya Mohammed
Electronic Payment Security Technologies
One-way Hash Function Network Security.
HMAC and its Design Objectives
Hash Function Requirements
Key Exchange, Man-in-the-Middle Attack
Message Authentication
Lightweight Security Scheme for Vehicle Tracking System Using CoAP
Security in Wide Area Networks
Blockchains Lecture 4.
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Presentation transcript:

An Improved Novel Key Management Protocol for RFID Systems Rania Baashirah, BVenkata Tarun Varma Namburi, Chakradhar Polisett, Naresh Ravuri, Vinay Kumar Avula, and Shakour Abuzneid Department of Computer Science & Engineering University of Bridgeport, Bridgeport, CT Abstract Implementation The growing demand to organize resourceful ways of identification has made “Radio Frequency Identification (RFID)” technology universal. One of the key problems in RFID is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed, and it is shown that they cannot provide security against some RFID attacks. In this paper, we present a novel cryptographic scheme, “Hacker Proof Authentication Protocol (HPAP)” which has been improved for “Multiple Tags” authentication at a single time process. We simulated the system using Java Application, and it is a time-saving process. Simulation using Java shows our protocol is secure with the fastest updating timestamps. Java code simulation is done using Net beans IDE. We tested the protocol for three groups Group-A, Group-B, Group-C with six tags in each group that are stored in .txt files. HPAP Functions: File IO system Hash Map Date and Calendar Random Print Scanner HPAP Results The protocol is proposed by Hakeem et al. in 2013. The goal is to maintain confidentiality, integrity, and security against different attacks using cryptographic authentication protocols for efficient RFID system. The protocol is based on the use of timestamp, lightweight hash function, and pseudo-random number generator (PRNG). The protocol is proved to be secure against: Replay attack Tag impersonation Tracking Location privacy Information leakage Man-In-The-Middle Message interception DOS attack De-Synchronization Single-Tag Multi-Tag Multi-Tag HPAP HPAP protocol was proposed to authenticate only one tag in the system. We extended the work to simulate the protocol and improve it by eliminating all its error and make it more efficient to authentication multiple tags for one reader signal. Conclusion The ubiquitous implementation of RFID systems in various applications has encouraged us to develop strong authentication protocols for privacy and security. In this paper, we have proposed a new cryptographic mutual authentication protocol in which a timestamp and pseudo-randomize update is presented. The updates on the secret value of the tag and encryption key are done by using an algorithm. This HPAP protocol is limited to a single tag. Only one tag can be authenticated for one reader signal. We improved this protocol to be able to authenticate multi tags per one reader signal before terminating the signal. This protocol eliminates all the attacks by generating a unique random number for every tag. This random number is used to create a secret key from an algorithm. We have used the same algorithm presented in the protocol. The communication cost between the tag and the server is reduced in our protocol resulting in lower cost of the whole system. Also, the Authentication is securely done in no time which is a major development.