Radio Frequency Identification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks. This paper surveys RFID systems, citing some of their applications as well as the numerous security vulnerabilities they suffer from. Then, some of the proposed solutions that guard against these vulnerabilities are presented and discussed. Then, a novel approach to achieve mutual authentication for ultra-lightweight tags is proposed using Physically Unclonable Functions (PUFs). The proposed approach provides robust security properties as well as good performance characteristics. A proof of concept implementation of the proposed protocol was done on Java programming language that proved the feasibility and efficiency of the protocol.
No abstract
In this paper we propose the design and implementation of ServBGP, a service routing protocol for managing service collaboration among cloud providers in cloud computing. ServBGP is based on the policy-driven design of the well-known BGP Internet routing protocol to support the different service interaction models currently employed in the cloud particularly the monolithic, composite, and broker-based service models. The main contribution of this work lies in devising a system that autonomously manages the different aspects of service interaction and collaboration among service providers from service discovery and advertisement to service consumption and revocation. The ServBGP routing decision engine is planned to operate by processing cost-bidding and QoS advertisement messages from the different cloud providers. A proof of concept implementation of the ServBGP design is realized on the NetKit network emulation and virtualization platform using the standard BGPv4 protocol specification.
The Domain Name System is a crucial part of the Internet's infrastructure, as it provides basic information that is vital for the proper operation of the Internet. The importance of DNS has caused it to be targeted by malicious attackers who are interested in causing damage and gaining personal benefits. Thus nowadays, DNS faces many security threats such as DNS spoofing and cache poisoning attacks. This paper presents S-DNS, an efficient security solution for thwarting cache poisoning attacks in the DNS hierarchy. The contribution of the S-DNS protocol lies in: (1) decreasing the success probability of DNS spoofing and cache poisoning by preventing man-in-the-middle attacks, (2) providing a backward compatible and simple security solution with low computation and communication overheads, (3) targeting the different DNS query interaction models from iterative, recursive, and caching schemes, and (4) employing an efficient IdentityBased Encryption key management scheme that relieves the different DNS interacting entities from the burden and complexities of traditional public-key infrastructures.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.