Abstract

RFID systems are one of the important techniques that have been used in modern technologies; these systems rely heavily on default and random passwords. Due to the increasing use of RFID in various industries, security and privacy issues should be addressed carefully as there is no efficient way to achieve security in this technology. Some active tags are low cost and basic tags cannot use standard cryptographic operations where the uses of such techniques increase the cost of these cards. This paper sheds light on the weaknesses of RFID system and identifies the threats and countermeasures of possible attacks. For the sake of this paper, an algorithm was designed to ensure and measure the strength of passwords used in the authentication process between tag and reader to enhance security in their communication and defend against brute-force attacks. Our algorithm is design by modern techniques based on entropy, password length, cardinality, Markov-model and Fuzzy Logic.

Highlights

  • IN order to achieve security and privacy protection in the RFID system, we studied the RFID environment concerning how it works, its key components as well as threats and countermeasures of this technology in order to determine the attacks that still need for further research. [1][2]Due to the limited size and cost of RFID systems, commonly used encryption techniques do not meet the desired security requirements

  • The aim of this paper is to develop a new algorithm that generates strong passwords which can withstand brute-force attacks and tests the strength of generated passwords, and to integrate this algorithm with other authentication algorithms to enhance the security of RFID communication

  • Most of the focus in RFID technology is on privacy, we should be more aware about information security issues in this technology

Read more

Summary

INTRODUCTION

IN order to achieve security and privacy protection in the RFID system, we studied the RFID environment concerning how it works, its key components as well as threats and countermeasures of this technology in order to determine the attacks that still need for further research. [1][2]. IN order to achieve security and privacy protection in the RFID system, we studied the RFID environment concerning how it works, its key components as well as threats and countermeasures of this technology in order to determine the attacks that still need for further research. Due to the limited size and cost of RFID systems, commonly used encryption techniques do not meet the desired security requirements. ; it is important to develop a new technique that enhances the security of RFID communication. When the password is weak, it can be broken by hackers by using brute-force attack. The aim of this paper is to develop a new algorithm that generates strong passwords which can withstand brute-force attacks and tests the strength of generated passwords, and to integrate this algorithm with other authentication algorithms to enhance the security of RFID communication

PROBLEM STATEMENT
RFID TECHNOLOGY
RFID ENVIRONMENT
RFID LAYERS COMMUNICATION
RFID THREATS AND SECURITY ATTACKS
RFID IMPACTS AND COUNTERMEASURES
CRYPTOGRAPHIC ATTCAKS
RELATED WORK
CONTRIBUTION
WHAT MAKES FOR A SECURE RANDOM GENERATOR?
ADDRESSING BRUTE-FORCE ATTACK USING STRONG PASSWORD
MEASURING THE STRENGTH OF PASSWORDS
ESTIMATING PASSWORD PROBABILITIES WITH MARKOV MODELS
ALGORITHM DESCRIPTION
CONCLUSION AND FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call