Reference Hub2
Simple Lightweight Authentication Protocol: Security and Performance Considerations

Simple Lightweight Authentication Protocol: Security and Performance Considerations

Gyozo Gódor, Sándor Imre
Copyright: © 2010 |Volume: 6 |Issue: 3 |Pages: 29
ISSN: 1548-0631|EISSN: 1548-064X|EISBN13: 9781609609191|DOI: 10.4018/jbdcn.2010070104
Cite Article Cite Article

MLA

Gódor, Gyozo, and Sándor Imre. "Simple Lightweight Authentication Protocol: Security and Performance Considerations." IJBDCN vol.6, no.3 2010: pp.66-94. http://doi.org/10.4018/jbdcn.2010070104

APA

Gódor, G. & Imre, S. (2010). Simple Lightweight Authentication Protocol: Security and Performance Considerations. International Journal of Business Data Communications and Networking (IJBDCN), 6(3), 66-94. http://doi.org/10.4018/jbdcn.2010070104

Chicago

Gódor, Gyozo, and Sándor Imre. "Simple Lightweight Authentication Protocol: Security and Performance Considerations," International Journal of Business Data Communications and Networking (IJBDCN) 6, no.3: 66-94. http://doi.org/10.4018/jbdcn.2010070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Radio frequency identification technology is becoming ubiquitous and, as a side effect, more authentication solutions come to light, which include numerous security issues. The authors’ have previously introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks, which performs exceptionally well in very large systems. In this paper, the authors give a detailed examination of small computational capacity systems from the point of view of security. This paper defines the model of attacker and the well-known attacks that can be achieved in these kinds of environments, as well as an illustration of the proposed protocol’s performance characteristics with measurements carried out in a simulation environment. This paper shows the effects of numerous attacks and the system’s different parameters on the authentication time while examining the performance and security characteristics of two other protocols chosen from the literature to compare the SLAP algorithm and give a proper explanation for the differences between them.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.