JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Novel Anti-collision Algorithms for Fast Object Identification in RFID System
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
The Evolution of RFID Security
IEEE Pervasive Computing
Proceedings of the 15th ACM conference on Computer and communications security
An RFID based system for monitoring free weight exercises
Proceedings of the 6th ACM conference on Embedded network sensor systems
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol
Proceedings of the 2009 ACM symposium on Applied Computing
Recognizing daily activities with RFID-based sensors
Proceedings of the 11th international conference on Ubiquitous computing
S-search: finding RFID tags using scalable and secure search protocol
Proceedings of the 2010 ACM Symposium on Applied Computing
CCCP: secure remote storage for computational RFIDs
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Wireless Personal Communications: An International Journal
Monitoring body positions and movements during sleep using WISPs
WH '10 Wireless Health 2010
Security and privacy in emerging wireless networks
IEEE Wireless Communications
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
The Wireless Identification and Sensing Platform (WISP) from Intel Research Seattle is an instance of Computational RFID (CRFID). Since WISP tags contain sensor data along with their IDs, the authentication of these tags should be different than the ones found in typical RFID networks. Moreover, there can be a situation where an adversary may create more collisions at the link layer to initiate the de-synchronization attack. This in turn may result in DoS attack or system failure and may increase the system response time. In this paper, we propose a De-synchronization attack resistant Robust Authentication Protocol (DRAP) for WISP networks. Our proposal offers a lightweight solution to defend against major security attacks, including de-synchronization and DoS attacks. This protocol can return desynchronized tags and readers to their synchronous state. Therefore, it provides robustness and ensures survivability. We evaluate DRAP protocol in a simulated WISP environment and report the results in this paper.