Monday 1 December 2014

MESSAGE AUTHENTICATION IN COMPUTATIONALLY CONSTRAINED ENVIRONMENTS



Abstract
                       RFID and Wireless Sensor Networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The latter are efficiently implemented by Hash Message Authentication Codes (HMAC). As clearly stated in the literature, current approved implementations of HMAC require resources that cannot be supported in constrained components. An approach to implement a compact HMAC by the use of stream ciphering is presented in this paper.

Existing System

MESSAGE integrity and authenticity, and replay prevention, are essential in security-related communications. Here, a receiver is expected to be able to verify that a received
message, originally transmitted by a valid source, was not changed. Also, the receiver has to verify that the message was not transmitted by a cloned source, and is not a retransmission of an originally genuine message transmitted in the past by a valid source

Proposed System 

The Challenge Response CR, generated in the interrogated component (top of the figure), is the MAC of three values: 1) the component’s secret key K, 2) a random challenge C received from the interrogator, and 3) the message M whose authenticity is to be proved. Subsequently, the interrogated component transmits: 1) the component’s public key PK, which is an encrypted version of K issued by the system manager and stored in the component, 2) M, and 3) CR.

Requirements:
Hardware Requirement:-

                       Hard Disk                    -           20 GB
                       Monitor                       -           15’ Color with VGI card support
                       RAM                            -           Minimum 256 MB
                       Processor                    -           Pentium III and Above (or) Equivalent
                       Processor speed         -           Minimum 500 MHz

            Software Requirement:-

                       Operating System      -           Windows XP Prof
                       Platform                      -           Visual Studio .Net 2005 & Above
                       Database                     -           SQL Server 2000 & above
                       Languages                   -           C#.Net
                       With or without GSM Modem Interface.

No comments:

Post a Comment