• DocumentCode
    156907
  • Title

    Comparative analysis of authentication techniques to Secure Low Level Reader Protocol (LLRP) connection

  • Author

    Elshrief, Shreen Abd Elfatah ; Sadek, Rowayda A. ; Ghalwash, Atef

  • Author_Institution
    Comput. & Inf., Cairo, Egypt
  • fYear
    2014
  • fDate
    28-30 April 2014
  • Firstpage
    73
  • Lastpage
    81
  • Abstract
    Radio Frequency Identification (RFID) is a technology that has risen to prominence over the past decade. EPCglobal Network provides a standardized way to collect, store, and distribute data among various organizations. Low-Level Reader Protocol (LLRP) is a standard interface between RFID Readers and Clients. LLRP implements Transport Layer Security (TLS) to setup a secure connection. Authentication techniques in TLS protocol are mainly based on public key cryptography. Recently TLS supports Kerberos cipher suites that provide Kerberos-based authentication. It is a symmetric key cryptography. This paper introduces RFID Access Control system (RFID-AC) as approach and assesses its security vulnerabilities. The paper experimentally implements TLS LLRP endpoints and examines different possible security solutions. Experiments focus on comparing the commonly used authentication technique; authenticated certificate-based versus Kerberos credentials-based. Analysis was done to determine the most suitable one for access control that can satisfy the security concerns and Quality of Services (QoS) issues.
  • Keywords
    message authentication; public key cryptography; quality of service; radiofrequency identification; transport protocols; EPCglobal network; Kerberos cipher suites; Kerberos credentials; Kerberos-based authentication; RFID access control system; RFID clients; RFID readers; RFID-AC; TLS protocol; authenticated certificate; authentication techniques; low level reader protocol connection; public key cryptography; quality of service; radio frequency identification; secure connection; security vulnerabilities; symmetric key cryptography; transport layer security; Authentication; Ciphers; Java; Libraries; Protocols; Radiofrequency identification; Authentication; Certificate; Kerberos; LLRP; RFID-AC system; TLS;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Radio Science Conference (NRSC), 2014 31st National
  • Conference_Location
    Cairo
  • Print_ISBN
    978-1-4799-3820-9
  • Type

    conf

  • DOI
    10.1109/NRSC.2014.6835063
  • Filename
    6835063