Simple Lightweight Authentication Protocol: Security and Performance Considerations

  • Authors:
  • Gyozo Gódor;Sándor Imre

  • Affiliations:
  • Budapest University of Technology and Economics, Hungary;Budapest University of Technology and Economics, Hungary

  • Venue:
  • International Journal of Business Data Communications and Networking
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Radio frequency identification technology is becoming ubiquitous and, as a side effect, more authentication solutions come to light, which include numerous security issues. The authors' have previously introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks, which performs exceptionally well in very large systems. In this paper, the authors give a detailed examination of small computational capacity systems from the point of view of security. This paper defines the model of attacker and the well-known attacks that can be achieved in these kinds of environments, as well as an illustration of the proposed protocol's performance characteristics with measurements carried out in a simulation environment. This paper shows the effects of numerous attacks and the system's different parameters on the authentication time while examining the performance and security characteristics of two other protocols chosen from the literature to compare the SLAP algorithm and give a proper explanation for the differences between them.