CFP last date
20 May 2024
Reseach Article

Time Stamp with Authentication Protocol for Securing Tag Reader Communication

by Harshad Panwar, Umesh Kumar Garg, Neetu Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 27
Year of Publication: 2013
Authors: Harshad Panwar, Umesh Kumar Garg, Neetu Sharma
10.5120/12143-8435

Harshad Panwar, Umesh Kumar Garg, Neetu Sharma . Time Stamp with Authentication Protocol for Securing Tag Reader Communication. International Journal of Computer Applications. 69, 27 ( May 2013), 15-17. DOI=10.5120/12143-8435

@article{ 10.5120/12143-8435,
author = { Harshad Panwar, Umesh Kumar Garg, Neetu Sharma },
title = { Time Stamp with Authentication Protocol for Securing Tag Reader Communication },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 27 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number27/12143-8435/ },
doi = { 10.5120/12143-8435 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:26.015423+05:30
%A Harshad Panwar
%A Umesh Kumar Garg
%A Neetu Sharma
%T Time Stamp with Authentication Protocol for Securing Tag Reader Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 27
%P 15-17
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

RFID is evolving as a major technology. Since 1940s its use in different domains shows its gaining importance also it's a better alternative to barcode as no line of sight is required. Here we have showed the use of time stamp that validates the authenticity of the sender to be legal or authorized. So, copying of tag is restricted by a large [3]. The proposed plan is to prevent the RFID system form attack by foreign agent. At the time of connection initiation when the two entities are authenticated and secondly to assure that the connection is not breached. Here, hash function and time stamp are used in conjunction with message [6]. This is a scalable and efficient mechanism to check eavesdropper illegal entry into the communication channel.

References
  1. National Institute of Standards and Technology "Guidelines for securing Radio Frequency Identification (RFID) systems" NIST special publication 800-98.
  2. Sindhu Karthikeyan and Mikhail Nesterenko "RFID Security without Extensive Cryptography" SASN'05, November 7, 2005, Alexandria, Virginia, USA.
  3. Gildas Avoine and Philippe Oechslin, "A Scalable and Provably Secure Hash based RFID Protocol", In International Workshop on Pervasive Computing and Communication Security – PerSec 2005, pp. 110-114, Mar. 2005, IEEE Computer Society Press, Kauai Island, Hawaii, USA.
  4. Gene Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol", International Conference on Pervasive Computing and Communications – PerCom 2006, Mar. 2006, IEEE Computer Society Press, Pisa, Italy.
  5. Istv´an Vajda and Levente Butty´an, "lightweight Authentication Protocol for Low-Cost RFID Tags", International Conference on Computational Science and its Applications - ICCSA 2005, LNCS 3480, pp. 619-627, May 2005, Springer-Verlag, Singapore.
  6. Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, "Cryptographic Approach to Privacy-friendly Tags", In RFID Privacy Workshop, 2003, MIT, USA.
  7. Stephen Weis, Sanjay Sharma, Ronald Rivest and Daniel Engels, "Security and Privacy Aspects of Low-Cost Radio FrequencyIdentification Systems", Conference on Security in Pervasive Computing – SPC 2003, LNCS 2802, pp. 454-469, Mar. 2003, Springer-Verlag, Boppard, Germany.
  8. Tassos Dimitriou, "A Lightweight RFID Protocol to protect against Traceability and Cloning attacks", Conference on Security andPrivacy for Emerging Areas in Communication Networks –SecureComm'05, pp. 59-66, Sep. 2005, Athens, Greece.
  9. Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren and Kwangjo
Index Terms

Computer Science
Information Sciences

Keywords

RFID Authentication Time stamp Replay attack