CFP last date
20 January 2025
Reseach Article

A Secure Authentication Scheme for Ubiquitous Computing

by Shruti S. Utpat, Parikshit N. Mahalle
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Number 13
Year of Publication: 2013
Authors: Shruti S. Utpat, Parikshit N. Mahalle
10.5120/14071-2293

Shruti S. Utpat, Parikshit N. Mahalle . A Secure Authentication Scheme for Ubiquitous Computing. International Journal of Computer Applications. 81, 13 ( November 2013), 9-13. DOI=10.5120/14071-2293

@article{ 10.5120/14071-2293,
author = { Shruti S. Utpat, Parikshit N. Mahalle },
title = { A Secure Authentication Scheme for Ubiquitous Computing },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 81 },
number = { 13 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume81/number13/14071-2293/ },
doi = { 10.5120/14071-2293 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:55:57.877015+05:30
%A Shruti S. Utpat
%A Parikshit N. Mahalle
%T A Secure Authentication Scheme for Ubiquitous Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 81
%N 13
%P 9-13
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Ubiquitous Computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them efficiently invisible to the user. The ubiquitous networking capabilities support various classes of applications/services which require "Any Services, Any Time, Any Where and Any Devices" operation. As in ubiquitous computing identity of object and its authentication to the system plays a very vital role. So, it is important to have a technique through which we can read the object. After reading there will be the next role of identification and authentication of the object. As in ubiquitous computing identity of object and its authentication to the system plays a very vital role. In today's world of technology the biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers and providing secure authentication for RFID tags. Previously many solutions had suggested but there were many ways to break them. An approach of TRAP family of protocols by Tsudik seems to provide secure authentication but it is vulnerable to Denial-Of-Service (DOS) and replay attacks. This paper presents a novel method for secure authentication of RFID tags using cryptographic approach. The proposed protocol is SIP based implementation aims to authentication of RFID tags. SIP provides benefit of running a particular session for one tag. The main contribution is to resist attacks on RFID systems.

References
  1. SocietyA. Juels, "RFID security and privacy: a research survey," IEEE Journal Selected Areas in Communications, vol. 24, no. 2, pp. 381–94, Feb. 2006.
  2. Weis, S. , Sarma, S. , Rivest, R. , and Engels, D. (2003). "Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems" In D. Hutter, G. Müller, W. Stephan, and M. Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 2003 Conference on Computational Science and its Applications - ICCSA 2005, Proceedings.
  3. Avoine, G. and Oechslin, P. (2005). "A scalable and provably secure hash based RFID protocol". In International Workshop on Pervasive Computing and Communication Security – PerSec 2005, pages 110–114, Kauai Island, Hawaii, USA, March 2005. IEEE, IEEE Computer Society Press.
  4. Lee, S. M. , Hwang, Y. J. , Lee, D. H. , and Lim, J. I. (2005). "Efficient authentication for lowcost RFID systems". In Osvaldo Gervasi, Marina Gavrilova, Vipin Kumar, Antonio Lagana`a Heow Pueh Lee, Youngsong Mun, David Taniar, and Chih Jeng Kenneth Tan, editors, International.
  5. Juels, A. and Pappu. R. (2003). "Squealing Euros: Privacy Protection in RFID-Enabled Banknotes". In Rebecca N. Wright, editor, Financial Cryptography -- FC'03, volume 2742 of LNCS, pages 103--121, Le Gosier, Guadeloupe, French West Indies, January 2003. IFCA, Springer-Verlag.
  6. Juels, A. (2004). "Minimalist cryptography for low-cost RFID tag". In Conference on Security in Communication Networks -- SCN'04, LNCS, Amalfi, Italia, September 2004. Springer- Verlag.
  7. Juels, A. (2005). "Strengthening EPC Tags against Cloning". In M. Jakobsson and R. Poovendran, eds. , ACM Workshop on Wireless Security (WiSe), pp. 67-76. 2005.
  8. G. Tsudik, "YA-TRAP: Yet another trivial RFID authentication protocol," in Proc 4th IEEE Int Conf Pervasive Computing and Communications Workshops. Washington, DC, 2006, pp. 640–643.
  9. Chatmon C. , Le T. v. , and Burmester M. (2006). "Secure anonymous RFID authentication protocols". Technical Report TR-060112, Florida State University, Department of Computer Science, Tallahassee, Florida, USA, 2006.
  10. M. Rahman, M. Soshi, and A. Miyaji, "A secure RFID authentication protocol with low communication cost," Mar. 2009, pp. 559–564.
  11. Kirk H. M. Wong, Patrick C. L. Hui, Allan C. K. Chan "Cryptography and authentication on RFID passive tags for apparel products" in Computers Industry 57 (2006) 342–349.
  12. Y. Zhang, L. Yang, and J. Chen, Eds. , "RFID and Sensor Networks: Architectures, Protocols, Security and Integrations", New York: CRC Press, 2010
Index Terms

Computer Science
Information Sciences

Keywords

Secure authentication protocol tag level counter TRAP family of protocols.