DRAP: A Robust Authentication Protocol to ensure survivability of computational RFID networks

Farzana Rahman, Sheikh Iqbal Ahamed

Research output: Chapter in Book/Entry/PoemConference contribution

1 Scopus citations

Abstract

The Wireless Identification and Sensing Platform (WISP) from Intel Research Seattle is an instance of Computational RFID (CRFID). Since WISP tags contain sensor data along with their IDs, the authentication of these tags should be different than the ones found in typical RFID networks. Moreover, there can be a situation where an adversary may create more collisions at the link layer to initiate the de-synchronization attack. This in turn may result in DoS attack or system failure and may increase the system response time. In this paper, we propose a De-synchronization attack resistant Robust Authentication Protocol (DRAP) for WISP networks. Our proposal offers a lightweight solution to defend against major security attacks, including de-synchronization and DoS attacks. This protocol can return desynchronized tags and readers to their synchronous state. Therefore, it provides robustness and ensures survivability. We evaluate DRAP protocol in a simulated WISP environment and report the results in this paper.

Original languageEnglish (US)
Title of host publication27th Annual ACM Symposium on Applied Computing, SAC 2012
Pages498-503
Number of pages6
DOIs
StatePublished - 2012
Externally publishedYes
Event27th Annual ACM Symposium on Applied Computing, SAC 2012 - Trento, Italy
Duration: Mar 26 2012Mar 30 2012

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Conference

Conference27th Annual ACM Symposium on Applied Computing, SAC 2012
Country/TerritoryItaly
CityTrento
Period3/26/123/30/12

Keywords

  • CRFID
  • authentication
  • de-synchronization
  • survivability

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'DRAP: A Robust Authentication Protocol to ensure survivability of computational RFID networks'. Together they form a unique fingerprint.

Cite this