The Synchronous Dynamic Adjusting Protocol

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Chapter 2

LITERATURE REVIEW

Aikaterini Mitrokotsa et al (2008) describe all the most generic RFID attacks into RFID layers which are related but not identical to ISO layers. They discover structure of possible attacks that can affect the RFID system and defined how we can prevent these attacks with safe handling. By contemplate the point of attack, its systemic effects and countermeasures jointly they can obtain a more coherent view of the threats and what must be done to counter them. They emphasis on the existing weaknesses of RFID system so that a better understanding of RFID attacks can be helpful to achieve and subsequently more efficient and effective the algorithms techniques and procedures to face these attacks may be develop. They define the following layers which are describing the functionality of RFID system. Every layer defines the different types of attacks besides the working of RFID system.[1]

Physical Layer

Network and Transport Layer

Application Layer

Strategic Layer

Geethapriya Thamilarasu et al (2008) identify the various RFID security threats and exposures to RFID components and describe the framework of intrusion detection system for detecting malicious reader and tag deportment in RFID. They have discussed the limitations and weakness of on tag cryptographic security solutions. They evolve the security framework with an IDS module including of the reader layer and middleware layer and estimate the prevention and detection mechanisms. They describe the security requirements on the basis of tag layer and reader layer and middleware layer and also define the security framework for radio frequency identification systems. They also explain the case studies of man in middle attack and watch dog reader etc.In the security framework they expand cryptography security solutions and authentication schemes. They explain the core framework that consist components which are given below: [2]

Check module at the interrogator layer

Finding module by the side of the middleware layer

exploit module

L.Kovavisaruch, et al (2007) they introduced the radio frequency interface to the smartcards and the contactless cards for payment and ticketing application in transportation system in Thailand. They also define the key success factors (standardization of RF spectrum, Cost of RFID tag and reader, Privacy and security issues, nation policies and human resource development) to successfully implement RFID in Thailand. They proposed that RFID will surely become a condition for transportation with both private sector and public sector due to the emerging demand of RFID market around the world. they explain the different key success factors which belong to the radio signals and privacy and security threats ,nationals policies of transportations and human resource developments [3]

Samer S. Saab et al (2011) describe indoor poisoning systems (IPSs) using passive tags. They presented mathematical modelling of distance and position errors taken from RFID tag RSSI (received signal strength information) measurement, incorporating an angle-dependent loss factor. Their proposed work is based on an object which carries an RFID reader module, this module examines low-cost passive transponders establish then to the entity path. A locationing system by means of a Kalman pass through a filter is planned by them. The inputs of the planned protocol are the dimensions of the backscattered signal power broadcast from close by RFID transponders. They define the algorithm which is based on angle compensation have following steps

Specified received signal strength information estimate the range between the interrogator anf different transponders.

Based on that range this protocol applies the direct method on it.

This method estimates the correct position of the interrogator which is used for communication.

And find the particular range between the tags and reader and start communication between them.

They explain the mathematical representation of distance and location of radio frequency identification systems their positioning system could be implemented for localization applications.[4]

Lars Kulseng et al (2009) described secure tag search problem in low-cost RFID systems. They proposed number of lightweight protocols based on LFSR (Linear Feedback Shift Register) and PUF (Physical Unclonable Function). The protocol proposed by them can prevent adversaries from learning tag identity and from impersonating RFID reader and tag. In their work, they were able to confirm the feasibility of the design presented by them. Application-specific integrated circuit although their tests were conducted in a FGPA (field programmable gate array) environment, an ASIC () implementation would perform similarly, as they have confirmed. They explain the system model of RFID that consist the main three components tag and reader and backend system. They define threat models which define the attacker activities. They also explain the different protocols which are given below.

Security analysis protocol

Standardization based protocol

Multi response protocols

They illustrate the physically uncloneable functions (PUF) like multiplexor PUF and ring oscillator, carry chain and butterfly physically uncloneable functions. And also implement the linear feedback shift register.

Smart transportation system is the concept of intelligent transportation which contains a large range of methods and applications. elegant electric vehicle charging, real-time traveller information, city wide traffic monitoring, transportation signal precedence, and federal fleet motor vehicle management may all be categorize as forms of intelligent transportation systems or smart transport. What makes them prudent is the utilize of embedded intellect to attach vehicles to every other and attach them to infrastructure and with central operational sites too. Transportation systems are also contemplate elegant at what time they are functional to get hold of smart policy goals in the built-up environment, for example improved mobility, condensed fuel utilization, and enhanced safety, economic competitiveness. [6]

Jichang CAO et al (2009) defined the anti collision algorithms for a radio frequency U-card system. The RF-UCard organization is a contactless smartcard structure which has multiple chip operating systems and several applications. A multi-card conflict could occur when additional than one card inside the reader’s examine field and thus it lowers the efficiency of the system. They presented a novel and enhanced algorithm to solve the multi-card collision problems in an RF-UCard system. The proposed SDA algorithm assigns a synchronous dynamic coordinative scheme that energetically corrects the structure size in the reader and the act in response probability in cards to maximize the efficiency to identify the card and processing. They define the different types of protocols which are given below:

ALOHA based on anti-collision algorithm

Dynamic framed slotted ALOHA algorithm

Bi-direction binary exponential index algorithm

Synchronous dynamic adjusting protocol

They also measure the performance of RF-U card system on the basis on mathematical Poisson process and they discuses the estimation of card quantity and also define the adjusting the response probability and procedure of the new SDA algorithm. [7]

Kurra Mallaiah (2009) defines the mini DES (digital encryption standard) algorithm for RFID security. The MiniDES symmetric key algorithm is appropriate for RFID tag security. It considers the type of security attainable in RFID based devices with a small amount of rewritable memory, but it has very limited computing capability. The writer aim is to show that MiniDES algorithm is efficient and sufficient to provide the security for the RFID based systems, there is no need for very complex cryptography algorithms which requires very high power of computational power. In RFID system MiniDES providing the authentication and provide the validity of tag is done in the microcontroller itself. Lower complex and light weight cryptography algorithms like miniDES are more applicable for low power RFID based embedded systems. They discuss the main framework of RFID system due to this they know about the embedded system and smart and contact cards. on the basis of that information they design the four round Mini DES. They explain the working of mini des with four rounds. They apply four rounds because the memories of transponders are very small. On the basis of transponders memory they design MiniDES which is able to provide the security to RFID system. The MiniDes encryption and decryption both contain four rounds and perform the operation.[8]

Vinay Deolalikar et al (2005) defined the clustering algorithms for RFID based system. They suggest two main algorithms which solve the clustering problem of RFID systems these are min max algorithm and Eigen-analysis based algorithm for clustering that are simple and do not need extensive computation. The accent suggested by them is based on simplicity. The algorithms can be implemented without the assistance of any sophisticated software, and in smaller network scan even be implemented by hand. They define the different clustering problems and develop the new clustering protocols which are given below

Mini max algorithm

Eigen analysis based algorithm

They discuses the on RFID systems interplay between the clustering and scheduling. In RFID transponders the collision problem is occur mostly to solve this problem they introduced the clustering algorithms which make the clusters of transponder and make the cluster heads they make them commutation easy between different tag and readers.[9]

Sindhu Karthikeyan et al describe the RFID security ways without extensive cryptography. They define the secure tag identification and tag sequencing algorithms for secure against known cipher text attacks. The secure tag identification algorithm is used to safe the tag and reader communication from the intruders and the tag sequencing algorithm is used for in multiple-tag version, the reader find out the keys of all the tags present. Over and above, each tag learns the position of its key in the order in which the keys of the tags participating in the identification session. This scheme can be called multiple tag sequencing. Once the tag comes to know about its position, after that the second phase of the identification algorithm can be proceeding in sequence. The reader broadcasts the messages for the tags in the order of their keys. Each tag receives the message sent particularly to it and ignores the rest. The define the different type of security algorithms which are given below

Secure Tag Identification

Multiple tag sequencing

In secure tag identification they implement the timing concept between the tag and reader commutation due to this the communication is secure. They introduced the protocol which is applied on tag and readers and make them secure communication. In the case of multiple tag sequencing the tag and reader self sequencing are presents which make them communication easy between tag and reader in this case the communication is done in the form of 0 and 1.[10]

GENG Shu-qin et al introduced the anti collision algorithms for multi-tag RFID. They defined the tree based protocols in which the collision occurs within a timeslot, the colliding tags are randomly separate into two subgroups by freely selecting 0 or 1, until all tags are identified. Those tags which select 0 transmit their IDs to a interrogator right away. Suppose a collision occurs again, then the collided tags are spited again by selecting 0 or 1. The tags that select 1 wait until all the tags that select 0 are successfully identified by the interrogator. Or in case if all the tags those select 0 are resolved, the tags those select 1 send their IDs to the interrogator. That procedure is repeated again and again until there is no further collision. They also defined the slotted aloha algorithms which are used to reduced the collision in RFID system. They define the anti-collision protocols those are given below

Tree based RFID protocol

Basic frame slotted ALOHA protocol

Dynamic frame slotted ALOHA protocol

Description enhanced dynamic frame slotted ALOHA

Performance enhanced dynamic frame slotted ALOHA [11]

Christy Chatmon et al describe the secure anonymous RFID authentication protocols. They proposed the three anonymous authentication protocols (YA-TRAP, A 1-pass and2-Pass optimistic anonymous RFID authentication protocol, which are used to prevent the RFID system from unauthorized tracking and monitoring, impersonation or cloning, and information leakage. these algorithms are based on security schemes like hash functions and pseudorandom functions because of that schemes these protocols are more efficient and scalable. They define the different model of RFID systems which contain the security frame work and authentication and availability and unlink ability and intractability. They define the following RFID authentication algorithms

YA-Trap authentication algorithm

2-pass anonymous authentication algorithm

1-pass anonymous authentication algorithm

These protocols are providing the security to the RFID systems during the communication. they provide the authentication to tag and readers. because of these protocols the authenticated tag or reader is only take a part in communication. [12]

Tao Cheng, Li Jin describes the Analysis and Simulation of RFID Anti-collision Algorithms. They introduced the binary tree algorithms and ALOHA algorithms, are based on simple anti-collision method of TDMA (Time division multiplexing).ALOHA algorithms have many advantages versions like Slotted ALOHA, Framed Slotted ALOHA and Dynamic Framed Slotted ALOHA. They defined the simulation of anti-collision algorithms and their results, in the simulation different parameters of the algorithms are used to examine the performance of the algorithm and several results are presented. And they proposed the advanced DFSA (Depth First Search Algorithm) algorithm which is better than the DFSA and binary tree algorithms. They define the following main anti collision algorithms are given below [13]

ALOHA

Class 1 protocol

DFSA

Dynamic framed slotted ALOHA

Binary tree based protocols

Ahmad-Reza Sadeghi et al describes the User Privacy in Transport Systems Based on RFID E-Tickets. They analyzed the vitality of current proposals for privacy protection of e-tickets and examine the applicability of privacy improving RFID-based protocols. They introduced the anonymize and issued protocols which provide the authentication and privacy of E- ticketing system. They also discussed suitable security and privacy requirements for e-tickets and point out the shortcomings of existing proposals. Then propose solutions for practical privacy-preserving e-tickets based on cryptographic techniques and RFID technology. They define the general application scenario of e-ticketing technology based on RFID technology in this they discuss about the RFID components and users tokens and verifiers which are work accordingly to the e-ticketing scenario and they also define the positional attacks which are given below [14]

Impersonation

Tracing

Denial of service

They define the different model which is based on trust and advisory in this model authentication protocols are implemented due to this it provide the secure communication. in this model the token is generate for every passenger which one want to but the tickets. these token contain the all information about the travelling route of the passenger on the basis of that the passenger pay the money and get the ticket. this model is used a RFID technology every ticket have a RFID chip which will trace the particular person. they also define the calypso e-ticketing standards and some other standards.they define the solution for the practical privacy preserving e-ticketing are given below:

Trust and advisory model

model of anonymous e-ticketing system

And they develop the three protocols which provide the security for e-ticketing

Issue protocol

Anonymize protocol

prove protocol

The problem on toll road RFID tags is Privacy, Anonymity and Individual Liberty. Toll road is a built road for which the user of the road is required to pay a fee or toll. TO solve these problems we use smart sensors which Smart Sensors are used digital wave radar for vehicle detection. Smart Sensor measures the vehicle volume, occupancy, speed and classification. The collected information is NOT used for law enforcement purposes. We use this information to produce the speed map and to produce travel times displayed on the dynamic message signs on the freeways. RFID technology is provide the following advantageous [15]

Simple to control and maintain

facilitate speed up performance

Automatic confirmation and consolidation of information

scam discovery and warm card sorting

many toll compilation modes

simple issuance of licences

Good organization in system has power over to avoid any failures.

Lum Jia Jun (2010) implements the zero knowledge authentication with zero knowledge .In this they use a zero level proof is a simple concept of cryptography which provide the authentication to the systems and users. Zero knowledge proof share some important properties which are following

Completeness

Soundness

zero knowledge

They also define the applications which are mostly used for zero level proof are following

Well-suited polices, Internet browsers & operating systems

Ability of performing errands which was complete by host software

Progress of new internet technologies, verbal communication and process have given method to

the expansion of new energetic applications.

Simple to use and are much near able and attractive

Do not require any extra hardware or software arrangement

Tradition construct internet application positively prices less than the inedible the sill applications. and gives better competence and reduced preservation.

They also define the new protocol which provides the authentication to the client and server machines.[16]

Md. Foisal Mahedi Hasan et al describe the RFID-based Ticketing for Public Transport System. They express the communication of basic RFID system and then they discuss the components of RFID technology which are used in public transport system. They introduced the new system which support the RFID based public transportation which have a al information about the arrival and departure time of buses and in this system they measure the distance between the different bus stops. they also define the compositions for RFID data tickets those are followings:

Passenger ID

City ID

ticket ID

Credit Balance

Check bit and others

System is anticipated designate fully automatic, dependable, transparent and suitable. The entire system is able to use in motor vehicle on main roads or highways, their toll compensation and in the railway ticketing system through little or no change. The cards individually reusable, they are very suitable as compared to paper based ticketing systems. The card also may be used in the direction of a worldwide travel pass card so as it will agree to any transportation on any route. [17]

Chih-Cheng Ou Yang et al (2009) describe the read and write performance of the low memory passive high frequency RFID tag reader system. They describe the information about internal parts of transponders and interrogators. And also they explain the encryption methods in the form of asymmetric and symmetric encryption in RFID systems and describe the hashing algorithms which is used for determine the accuracy in this the hash functions are applied on the seed value and produce a result in the form of hash code. They develop the main program which support the read and write the performance of the low memory passive RFID tags and reader they test that program on the basis of their interface which include encryption methods and key values, number of test cycles, delay and accuracy between the tags. According to the inspection results, the performance of read and write cycle is the main function of the delay between the RFID tag and reader. Though the basis of encryption it does not have an effect on read accurateness and write accurateness significantly, while the information is larger. Yet, the encryption function does involve R/W time due to include more data. They use symmetric and asymmetric encryption techniques which produce the different results, and they test those results on different parameters.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now