skip to main content
10.1145/2245276.2245372acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks

Published: 26 March 2012 Publication History

Abstract

The Wireless Identification and Sensing Platform (WISP) from Intel Research Seattle is an instance of Computational RFID (CRFID). Since WISP tags contain sensor data along with their IDs, the authentication of these tags should be different than the ones found in typical RFID networks. Moreover, there can be a situation where an adversary may create more collisions at the link layer to initiate the de-synchronization attack. This in turn may result in DoS attack or system failure and may increase the system response time. In this paper, we propose a De-synchronization attack resistant Robust Authentication Protocol (DRAP) for WISP networks. Our proposal offers a lightweight solution to defend against major security attacks, including de-synchronization and DoS attacks. This protocol can return desynchronized tags and readers to their synchronous state. Therefore, it provides robustness and ensures survivability. We evaluate DRAP protocol in a simulated WISP environment and report the results in this paper.

References

[1]
Ahamed, S. I., Rahman, F., Hoque, E., Kawsar, F., and Nakajima, T. Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol. In Journal of Security and Its Applications, Vol. 2, No. 4. 2008. 57--66.
[2]
Avoine, G. Security and Privacy in RFID Systems. Technical Report. http://www.avoine.net/rfid/, 2008.
[3]
Blackert, W. J., Gregg, D. M., Castner, A. K., Kyle, E. M., Hom, R. L., and Jokerst, R. M. Analyzing interaction between distributed denial of service attacks and mitigation technologies. In Proceedings of DARPA Info. Survivability Conf. and Expo. Vol. 1. 2003. 26--36.
[4]
Buettner, M., Greenstein, B., Sample, A., Smith. J. R. and Wetherall, D. Revisiting smart dust with RFID sensor networks. In Proceedings of the Workshop on Hot Topics in Networks. 2008.
[5]
Buettner, M., Prasad, R., Philipose, M., and Wetherall, D. Recognizing daily activities with RFID-based sensors. In Proceedings of Ubiquitous computing. 2009. 51--60.
[6]
Cha, J. R. and Kim, J. H. Novel Anti-collision Algorithms for Fast Object Identification in RFID System. In Proceedings of Parallel and Distributed Systems. 2005. 63--67.
[7]
Chae, H. J., Yeager, D. J., Smith, J. R., and Fu, K. Maximalist Cryptography and Computation on the WISP UHF RFID Tag. In Proceedings of RFID Security. 2007.
[8]
Chaudhri, R., Lester, J., and Borriello, G. An RFID based system for monitoring free weight exercises. In Proceedings of conference on Embedded network sensor systems. ACM, NY, USA. 2008. 431--432.
[9]
Czeskis, A., Koscher, K, Smith, J. R., Kohno, and T. RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications. In Proceedings of Computer and Comm. Security. 2008. 479--490.
[10]
Holleman, J., Yeager, D., Prasad, R., Smith, J., and Otis, B. NeuralWISP: An Energy Harvesting Wireless Neural Interface with 1-m Range. In Proceedings of Biomedical Circuits and Systems Conference. 2008. 37--40.
[11]
Hoque, M. E., Rahman, F., Ahamed, S. I., and Park, J. H. Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments. In Springer Wireless Personal Communication, Vol. 55, No. 1. 2009. 65--79.
[12]
Hoque, M. E., Rahman, F., and Ahamed, S. Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol. In Proceedings of ACM Symposium on Applied Computing. 2009, 1062--1066.
[13]
Hoque, M. E., Rahman, F., and Ahamed, S. I. S-Search: Finding RFID Tags Using Scalable and Secure Search Protocol. In Proceedings of Symposium on Applied Computing. 2010. 439--443.
[14]
Hoque, E. Dickerson, R., and Stankovic, J. A. Monitoring Body Positions and Movements during Sleep using WISPs. In Proceedings of ACM Wireless Health. ACM, NY, USA. 2010. 44--53.
[15]
Intel Research Seattle, http://seattle.intel-research.net/wisp/#pub (last accessed: 27th Feb. 2010)
[16]
Jiang, B., Smith, J., Philipose, M., Roy, S., Rajan, S. K, and Mamishev, A. Energy scavenging for inductively coupled passive RFID systems. In IEEE Trans. on Instrumentation and Measurement. 2005. 984--989.
[17]
Juels, A. RFID security and privacy: A research survey. RSA Laboratories. 2005.
[18]
Juels, A., and Weis, S. Defining strong privacy for RFID. In. Proceedings of the Cryptology ePrint Archive, Report 2006/137, IACR. 2006.
[19]
Lee, S., Joo, S. D., and Lee, C. W. An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification. In Proceedings of MobiQuitous. 2005. 166--172.
[20]
Myung, J. and Lee, W. Adaptive Binary Splitting: A RFID Tag Collision Arbitration Protocol for Tag Identification. In Proceedings of the Conference on Broadband Networks. 2006. 347--355.
[21]
Ma, D., and Tsudik, G. Security and privacy in emerging wireless networks. In Journals of Wireless Comm., vol. 17, no. 5. 2010. 12--21
[22]
www.rfidjournal.com. Last accessed on March 22, 2010.
[23]
Rieback, M., Crispo, B., and Tanenbaum, A. The evolution of RFID security. In Proceedings of Pervasive Computing, Vol. 5, No. 1. 2006. 62--69.
[24]
Salajegheh, M., Clark, S., Ransford, B., Fu, K, and Juels, A. CCCP: Secure remote storage for computational RFIDs. In Proceedings of USENIX security symposium. 2009. 215--230.
[25]
Sample, A. P., Yeager, D. J., Powledge, P. S., and Smith, J. R. Design of a passively-powered, programmable platform for UHF RFID systems. In Proceedings of Conf. on RFID. 2007. 149--156.
[26]
Saxena, N. and Voris, J. Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model. In Proceedings of the Workshop on RFID Security. 2010.
[27]
Segawa, N. Behavior Evaluation of Sika Deer (Cervus Nippon) by RFID System. In WISP Summit. 2009.
[28]
Wang, B. T., and Schulzrinne, H. An IP traceback mechanism for reflective DoS attacks. In Proceedings of Canadian Conference on Electrical and Computer Engineering, Vol. 2, 2004. 901--904.
[29]
Wang, Y., Attebury, G, and Ramamurthy, B. A survey of security issues in wireless sensor networks. In IEEE Communication. Surveys Tutorials, vol. 8. 2006. 2--23.
[30]
Wood, A. D., Stankovic, J. A., and Son, S. H. JAM: A Jammed-Area Mapping Service for Sensor Networks. In Proceedings of Real-Time Systems Symposium. 2003. 286--297.
[31]
Yeager, D. J., Powledge, P. S., Prasad, R., Wetherall, D., Smith, J. R. Wirelessly-Charged UHF Tags for Sensor Data Collection. In Proceedings of the Conference on RFID. 2008. 320--327.
[32]
Zhen, B., Kobayashi, M., and Shimizui, M. Framed aloha for multiple RFID objects identification. In IEICE Transactions on Communications, vol. E80-B, no. 3. 2005. 991--999.

Cited By

View all
  • (2018)Survey on Prominent RFID Authentication Protocols for Passive TagsSensors10.3390/s1810358418:10(3584)Online publication date: 22-Oct-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
March 2012
2179 pages
ISBN:9781450308571
DOI:10.1145/2245276
  • Conference Chairs:
  • Sascha Ossowski,
  • Paola Lecca
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 March 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CRFID
  2. authentication
  3. de-synchronization
  4. survivability

Qualifiers

  • Research-article

Conference

SAC 2012
Sponsor:
SAC 2012: ACM Symposium on Applied Computing
March 26 - 30, 2012
Trento, Italy

Acceptance Rates

SAC '12 Paper Acceptance Rate 270 of 1,056 submissions, 26%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Survey on Prominent RFID Authentication Protocols for Passive TagsSensors10.3390/s1810358418:10(3584)Online publication date: 22-Oct-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media