scispace - formally typeset
Search or ask a question

Showing papers by "Robin Doss published in 2017"


Journal ArticleDOI
TL;DR: A secure RFID tag search protocol based on quadratic residues which requires the tags to perform only simple XOR, MOD and 128 bit PRNG operations, thus achieving compliance with EPC standards is proposed.

21 citations


Journal ArticleDOI
01 Mar 2017
TL;DR: This work critically evaluates the use of ambient conditions in RFID authentication protocols and chooses to use tag temperature and develop a variant of yoking proof protocol for simultaneous authentication of multiple tags.
Abstract: A majority of RFID authentication scenarios involve a single tag that is identified independent of other tags in the field of the reader. However, there are situations that necessitate simultaneous authentication of multiple tags as well as the verification of their simultaneous physical proximity to the reader. Juels (2004) introduced yoking proof for simultaneous authentication of multiple RFID tags. Several researchers have since then developed variants of yoking proof using both symmetric and asymmetric cryptography. Given that the ambient conditions are bound to be very similar for all objects that are in close physical proximity to one another, we critically evaluate the use of various relevant ambient conditions for this purpose. Based on our evaluation, we choose to use tag temperature and develop a variant of yoking proof protocol for simultaneous authentication of multiple tags. A yoking proof protocol for the simultaneous authentication of multiple RFID tagsCritically evaluate the use of ambient conditions in RFID authentication protocolsUse temperature in a modified yoking proof protocol

17 citations


Journal ArticleDOI
TL;DR: This paper presents a novel attack and traceback mechanism against a special type of packet dropping attacks packet collusion attacks, where the malicious node(s) drops some or all packets and then injects new fake packets in their place to mask the packet dropping.

12 citations


Book ChapterDOI
31 Aug 2017
TL;DR: This paper proposes an extension to an existing RFID protocol to address the scalability issues required in an IoT context and presents a review of work by other researchers in this context.
Abstract: The security and privacy issues in large scale deployments of RFID/IOT systems is of critical concern to researchers and industry alike. However scalability is often a forgotten aspect of protocol design and is not well addressed. In this paper, we propose an extension to an existing RFID protocol to address the scalability issues required in an IoT context. We also present a review of work by other researchers in this context.

8 citations


Proceedings ArticleDOI
13 Mar 2017
TL;DR: This work demonstrates the effectiveness and efficiency of portguard against popular attacks, an authentication tool developed with the intention of hiding those services that are up and running in the gateway from any external attackers.
Abstract: Internet of Things is a connected ecosystem where everyday objects have network connectivity allowing them to do data transfers. This scenario often involves a gateway for enabling the communication between things which are connected to the internet. Gateways run multiple network based services in them which are often visible to any device in the same network. It acts as the entry point for the traffic to and from the local IoT network. Usually security of such devices is neglected and left unguarded making them prime targets for hackers. Portguard is an authentication tool developed with the intention of hiding those services that are up and running in the gateway from any external attackers. Any application/middleware servers or edge/sensor nodes attempting to connect to the services in the gateway will be authenticated prior to granting access to the gateway services. We demonstrate the effectiveness and efficiency of portguard against popular attacks.

7 citations


Journal ArticleDOI
TL;DR: This paper analyzes two recent RFID protocols proposed by researchers and shows that the ownership transfer protocol proposed by Wang et al., is vulnerable to tracing attacks while the mutual authentication Protocol proposed by Cho et al. is vulnerableTo address the vulnerabilities, and improve the scalability of these schemes making them suitable for large-scale deployments.
Abstract: Radio Frequency Identification (RFID) technology is expected to play a key role in the Internet of Things (IoT) and has applications in a wide variety of domains ranging from automation to healthcare systems Therefore, the security and privacy of RFID communication is critical In this paper, we analyze two recent RFID protocols proposed by researchers Specifically we show that the ownership transfer protocol proposed by Wang et al, is vulnerable to tracing attacks while the mutual authentication protocol proposed by Cho et al is vulnerable to key disclosure and backward traceable attacks We propose secure improvements to these protocols to address the vulnerabilities, and improve the scalability of these schemes making them suitable for large-scale deployments

4 citations


Proceedings ArticleDOI
01 Jan 2017
TL;DR: A technique that uses Merkle trees to protect the integrity of the packets transferred in a network and as modified packets are detected and their transmission is stopped, over time the packet modification rate drops, thus improving the performance of the network.
Abstract: Packet integrity or modification attacks commonly happen in Opportunistic Networks (OppNets) In this paper, we propose a technique that uses Merkle trees to protect the integrity of the packets transferred in a network When adopting the technique in an OppNet, nodes will be able to verify that data transferred from node to node is received unchanged and in its original state Using a solid trust and reputation system, nodes are able to inform and be informed of legitimate and malicious nodes in the network The technique has been implemented using an OppNet protocol, and the results reflect the effectiveness of the technique As modified packets are detected and their transmission is stopped, over time, the packet modification rate drops, thus improving the performance of the network

3 citations


Proceedings ArticleDOI
01 Oct 2017
TL;DR: A refinement of the Service Engineering Framework provides six modeling aspects in service engineering: Business, capability, value, service, interaction, process and software.
Abstract: Digitally enabled service becomes very pervasive nowadays In this type of service, a functionality of a business service is supported and enriched by software services arranged in a service-oriented system Various methodologies were proposed to design and develop such service, but mostly focus only on either business side or software side Integrating these two approaches a Service Engineering Framework was proposed This paper is a report on case studies performed based on the framework After the description and examination of the case studies, a refinement of the framework is proposed The conclusion provides six modeling aspects in service engineering: Business, capability, value, service, interaction, process and software

1 citations