Back to Search Start Over

Cryptanalysis of Resource Constraint IoT Network Authentication Protocol RAPP

Authors :
M. Najam-ul-Islam
Madiha Khalid
Umar Mujahid
Osman Khan
Source :
2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST).
Publication Year :
2021
Publisher :
IEEE, 2021.

Abstract

The 5th generation mobile communication system aims to provide ultrahigh-speed internet service which is a basic requirement for the development in the field of ubiquitous computing. The Internet of Things (IoT) network is an emerging technology in the field of pervasive computing. The IoT platform refers to a network of computing devices and intelligent sensors/actuators collaborating via internet to achieve the objectives defined by the application. The security and privacy of the networks is a prime concern since confidential data is being collected by the smart sensors on a real-time basis. A secure IoT architecture performs identity verification of edge devices before providing them access to the network resources. The RFID enabled IoT networks use Ultralight weight Mutual Authentication Protocols (UMAPs) for node authentication. A UMAP ensures the Confidentiality, Integrity, Availability and Authentication (CIAA) of the communicating parties to ensure security and privacy. In this paper confidentiality assessment of an ultralight weight protocol known as RFID Authentication Protocol using Permutation (RAPP) is performed. The structural cryptanalysis indicates that the RAPP protocol is incapable to ensuring confidentiality of information embedded in the encrypted messages.

Details

Database :
OpenAIRE
Journal :
2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST)
Accession number :
edsair.doi...........03383571c019185d212b22a8532b21ae
Full Text :
https://doi.org/10.1109/ibcast51254.2021.9393199