[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1854099.1854142acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Securing RFID-based authentication systems using ParseKey+

Published: 07 September 2010 Publication History

Abstract

Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be compromised. Therefore, a more secure scheme is required in order to enhance safety of access control through RFID tags in particularly highly secure environments such as secure virtual meetings or authentication and access control to access high security locals. We wish to present attendance control system which is more like access control in general as an application of our novel security enhancement on RFID based access control systems. The security enhancement utilizes partial ParseKey+ multi-way authentication scheme. ParseKey+ scatters randomly divided sub-keys into uniformly distributed noise. Generated file is encrypted using AES256 and then it is written into RFID device. Each successful login changes the key and its trace kept in DB in addition to updating the device for future login.

References

[1]
Qaiser, A. and Khan, S.A. Automation of Time and Attendance using RFID Systems. In Emerging Technologies, 2006. ICET '06. International Conference on (Sliema 2006), IEEE, 60--63.
[2]
Elçi, Atilla and Rahnama, Behnam. AWGN based seed for random noise generator in ParseKey+. In Proc. SIN 2009 (Famagusta, North Cyprus 2009), ACM New York, NY, USA, 244--248.
[3]
Silva, F, Filipe, V, and Pereira, A. Automatic Control of Students' Attendance in Classrooms Using RFID. In Systems and Networks Communications, 2008. ICSNC '08. 3rd International Conference on (Sliema 2008), IEEE, 60--63.
[4]
Chen, J.W. A ubiquitous information technology framework using RFID to support students' learning. In Advanced Learning Technologies, 2005. ICALT 2005. Fifth IEEE International Conference on (Tainan 2005), IEEE, 95--97.
[5]
Lim, T.S., Sim, S.C., and Mansor, M.M. RFID based attendance system. In Industrial Electronics & Applications, 2009. ISIEA 2009. IEEE Symposium on (Malaysia 2009), IEEE, 778--782.
[6]
Chen, Whai-De and Chang, Hsuan-Pu. Using RFID technology to develop an attendance system and avoid traffic congestion around kindergartens. In Ubi-Media Computing, 2008 First IEEE International Conference on (Lanzhou 2008), IEEE, 568--572.
[7]
Aqeel-ur-Rehman, Abbasi, A.Z., and Shaikh, Z.A. Building a Smart University Using RFID Technology. In Computer Science and Software Engineering, 2008 International Conference on (Wuhan, Hubei 2008), IEEE, 641--644.
[8]
Sabri, Yeop, Aziz, M.K. Abdul, Shah, M.Z.A. Mohd, Kadir, M.S.R. Abd, and M.F. Smart Attendance System by suing RFID. In Applied Electromagnetics, 2007. APACE 2007. Asia- Pacific Conference on (Melaka 2007), IEEE, 1--4.
[9]
Biryukov, Alex and Kushilevitz, Eyal. From Differential Cryptanalysis to Ciphertext-Only Attacks CRYPTO 1998. Springer-Verlag, 1998.
[10]
Kaps, Jens-Peter and Sunar, Berk. Energy Comparison of AES and SHA-1 for Ubiquitous Computing. In Emerging Directions in Embedded and Ubiquitous Computing. Springer Berlin / Heidelberg, Worcester, MA 01609, U.S.A., 2006.
[11]
Wei, YongZhuang and Hu, YuPu. New related-key rectangle attacks on reduced AES-192 and AES-256. Science in China Series F: Information Sciences, 52, 4 (Monday, April 06, 2009), 617--626.
[12]
Rahnama, Behnam and Elci, Atilla. ParseKey+: a Five-Way Strong Authentication Procedure as an Approach to Client/Server Impersonation Avoidance Using Steganography for Key Encryption. In International Conference on Security and Management (SAM'07) (Las Vegas, USA June 25-28, 2007), 97--106.
[13]
Haller, N. and Atkinson, R. On Internet Authentication. Retrieved from RFC 1704 (1994).

Cited By

View all
  • (2024)Spatiotemporal Information-Based Authorization Method for UOF DocumentsIntelligent Networked Things10.1007/978-981-97-3951-6_8(74-84)Online publication date: 10-Jul-2024
  • (2022)Risk-Based AuthenticationHandbook of Research on Mathematical Modeling for Smart Healthcare Systems10.4018/978-1-6684-4580-8.ch009(154-179)Online publication date: 24-Jun-2022
  • (2019)Online Classroom Attendance System Based on RFID Technology and Cloud Computing2019 23rd International Computer Science and Engineering Conference (ICSEC)10.1109/ICSEC47112.2019.8974778(299-304)Online publication date: Oct-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '10: Proceedings of the 3rd international conference on Security of information and networks
September 2010
286 pages
ISBN:9781450302340
DOI:10.1145/1854099
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Microsoft: Microsoft
  • RFBR: Russian Foundation for Basic Research

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 September 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attendance control
  2. authentication
  3. parsekey+
  4. rfid based access control

Qualifiers

  • Research-article

Conference

SIN '10
Sponsor:
  • Microsoft
  • RFBR
SIN '10: 3rd International Conference of Security of Information and Networks
September 7 - 11, 2010
Rostov-on-Don, Taganrog, Russian Federation

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Spatiotemporal Information-Based Authorization Method for UOF DocumentsIntelligent Networked Things10.1007/978-981-97-3951-6_8(74-84)Online publication date: 10-Jul-2024
  • (2022)Risk-Based AuthenticationHandbook of Research on Mathematical Modeling for Smart Healthcare Systems10.4018/978-1-6684-4580-8.ch009(154-179)Online publication date: 24-Jun-2022
  • (2019)Online Classroom Attendance System Based on RFID Technology and Cloud Computing2019 23rd International Computer Science and Engineering Conference (ICSEC)10.1109/ICSEC47112.2019.8974778(299-304)Online publication date: Oct-2019
  • (2015)A Review of Student Attendance System Using Near-Field Communication NFC TechnologyProceedings, Part IV, of the 15th International Conference on Computational Science and Its Applications -- ICCSA 2015 - Volume 915810.1007/978-3-319-21410-8_56(738-749)Online publication date: 22-Jun-2015
  • (2013)An Application Security Framework for Near Field CommunicationProceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2013.50(396-403)Online publication date: 16-Jul-2013
  • (2012)Strong authentication with mobile phoneProceedings of the 15th international conference on Information Security10.1007/978-3-642-33383-5_5(70-85)Online publication date: 19-Sep-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media