Wireless Protocols for Anti Cloning and Security

Abstract

RFID system (Radio-Frequency Identification) is a technology for automated identification of objects and people. Human beings are smart enough to identify an object under a variety of challenge circumstances. RFID systems are emerging as one of the most pervasive computing technologies. But there are still a large number of problems that are to be addressed. One of the fundamental issues still to be addressed is privacy, which concludes association threat, location threat, preference threat, constellation threat, transaction threat, action threat and breadcrumb threat (Kim, J., Yang, C, Jeon, J,2007). Misbehaviours of both readers and tags will lead to attacks to the system. The common attacks on the readers, tags and the air interface between them comprise: Tracking or Tracing, Tamper, Clandestine Scanning, Counterfeit Tags, Cloning Tags, Eavesdropping, Replay, man-in-the-middle attack, Spoofing, Differential power analysis, Timing Attacks, Denial of Service, Physical Attacking and so on (P. Cuenca and L. OrozcoBarbosa, 2006.),(Kim, J., Yang, C, Jeon, J, 2007). Due to scarceness of resources most of the proposed protocols were designed using symmetric key cryptographic algorithms. However, it has been shown that it is inevitable to use publickey cryptographic algorithms to satisfy these requirements. A number of mechanisms have been devised to overcome the problems related to security and privacy issue of RFID systems. In this paper we propose three anonymous RFID authentication protocols and prove that they are secure in the traditional cryptographic framework. Our model allows most of the threats that apply to RFIDs systems including, denial of service, impersonation, malicious traceability, information leakage through power analysis and active man-in-the middle attacks. Our protocols are efficient and scalable.

Authors and Affiliations

Saurabh Gupta| Research Scholar - Department of Information Technology, MIT Muzaffarpur, India, saurabhg.mit@gmail.com, Dr. R. K. Singh| Head – Department of Physics, G. P. Darbhanga, India, Dr. K. B. Singh| Head- Department of Information Technology, MIT, Muzaffarpur, India

Keywords

Related Articles

Speaker Recognition System using Wavelet Transform under Stress Condition

In this paper, we introduced a textdepend speaker recognition by using wavelet transform under stressed conditions. Here we compare different feature such as ARC, LAR, LPCC, MFCC, CEP and after comparison we found tha...

Intelligent Anti-Theft System for Automobiles

Security is prime sympathy toward everybody. These days all the car are outfitted with auto cop systems. Despite the fact that, the criminals are breaking the obstructions and take the vehicles. This venture is the r...

A Novel Scheme For Profit Minimization And Resource Distribution To Clients In Cloud

A DSR (double resource renting) system is planned primarily in which short-term leasing and long-term leasingare combined aiming at the present problems. This double leasingsystem can successfully guarantee the value...

A Modified Gradient Boosting Trees Methods To Transform Social Networking Features Into Embeddings

We propose a novel answer for cross-webpage cool start item suggestion, which expects to prescribe items from online business sites to clients at long range informal communication destinations in "frosty begin" circu...

Studies on organic acid based biotech nutrients to enhance Soil organic carbon (SOC) and grain yield in Maize (Zea Mays) crop

Maize (Zea mays) is one of the staple foods in many third world nations. Its production has increased over years as people change their consumption trends. Maize has evolved from a purely substance to a successful co...

Download PDF file
  • EP ID EP16226
  • DOI -
  • Views 412
  • Downloads 19

How To Cite

Saurabh Gupta, Dr. R. K. Singh, Dr. K. B. Singh (2013). Wireless Protocols for Anti Cloning and Security. International Journal of Science Engineering and Advance Technology, 1(5), 103-110. https://www.europub.co.uk/articles/-A-16226