Back to Search
Start Over
Cryptanalysis of Resource Constraint IoT Network Authentication Protocol RAPP
- Source :
- 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST).
- Publication Year :
- 2021
- Publisher :
- IEEE, 2021.
-
Abstract
- The 5th generation mobile communication system aims to provide ultrahigh-speed internet service which is a basic requirement for the development in the field of ubiquitous computing. The Internet of Things (IoT) network is an emerging technology in the field of pervasive computing. The IoT platform refers to a network of computing devices and intelligent sensors/actuators collaborating via internet to achieve the objectives defined by the application. The security and privacy of the networks is a prime concern since confidential data is being collected by the smart sensors on a real-time basis. A secure IoT architecture performs identity verification of edge devices before providing them access to the network resources. The RFID enabled IoT networks use Ultralight weight Mutual Authentication Protocols (UMAPs) for node authentication. A UMAP ensures the Confidentiality, Integrity, Availability and Authentication (CIAA) of the communicating parties to ensure security and privacy. In this paper confidentiality assessment of an ultralight weight protocol known as RFID Authentication Protocol using Permutation (RAPP) is performed. The structural cryptanalysis indicates that the RAPP protocol is incapable to ensuring confidentiality of information embedded in the encrypted messages.
Details
- Database :
- OpenAIRE
- Journal :
- 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST)
- Accession number :
- edsair.doi...........03383571c019185d212b22a8532b21ae
- Full Text :
- https://doi.org/10.1109/ibcast51254.2021.9393199