Theme-Logo
  • Login
  • Home
  • Course
  • Publication
  • Theses
  • Reports
  • Published books
  • Workshops / Conferences
  • Supervised PhD
  • Supervised MSc
  • Supervised projects
  • Education
  • Language skills
  • Positions
  • Memberships and awards
  • Committees
  • Experience
  • Scientific activites
  • In links
  • Outgoinglinks
  • News
  • Gallery
publication name Counter Attack Methodology For Preventing Vulnerabilities or Attacks on SASI ,
Authors Raafat A. El-Kammar, Alaa Eldeen S. A. , Mahmoud U. Ouf.
year 2010
keywords
journal 1st International Conference On Advanced Computing and Communications, (ACC – 2010)
volume Not Available
issue Not Available
pages Not Available
publisher Not Available
Local/International International
Paper Link Not Available
Full paper download
Supplementary materials Not Available
Abstract

Radio Frequency Identification (RFID) is a technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to uniquely identify an object, animal, or person. RFID Systems technically consist of RFID Tag, Readers, Communication Protocols, Information Systems, Networks Lookup and Location Services. There are several Security threats affect RFID systems; one of them is called de-synchronization attacks. These attacks are aimed to change the values stored in the RFID tags to be not equals to that stored in the database so that tags will not be able to identify valid readers and consider them as attacker. Based on that, researchers have proposed various security and protocols solutions as introduced by Chien. Chien [7] proposed a new ultra lightweight protocol, called SASI, which provides mutual authentication, tag anonymity, data integrity, and forward security. It was designed to resist de-synchronization attack, replay attack, and man-in- the middle attack. However, two de-synchronization attacks were found to break the protocol. In this paper, we propose a new methodology used to prevent vulnerabilities or attacks on SASI. The proposed methodology is considered as a multi level identification schema to prevent active attackers from de-synchronizing the data sent between tags and readers.

Benha University © 2023 Designed and developed by portal team - Benha University