Abstract
RFID and Wireless Sensor
Networks exemplify computationally constrained environments, where the compact
nature of the components cannot support complex computations or high communication
overhead. On the other hand, such components should support security
applications such as message integrity, authentication, and time stamping. The
latter are efficiently implemented by Hash Message Authentication Codes (HMAC).
As clearly stated in the literature, current approved implementations of HMAC
require resources that cannot be supported in constrained components. An
approach to implement a compact HMAC by the use of stream ciphering is
presented in this paper.
Existing System
MESSAGE
integrity and authenticity, and replay prevention, are essential in
security-related communications. Here, a receiver is expected to be able to
verify that a received
message,
originally transmitted by a valid source, was not changed. Also, the receiver
has to verify that the message was not transmitted by a cloned source, and is
not a retransmission of an originally genuine message transmitted in the past by
a valid source
Proposed System
The
Challenge Response CR, generated in the interrogated component (top of the
figure), is the MAC of three values: 1) the component’s secret key K, 2) a
random challenge C received from the interrogator, and 3) the message M whose
authenticity is to be proved. Subsequently, the interrogated component
transmits: 1) the component’s public key PK, which is an encrypted version of K
issued by the system manager and stored in the component, 2) M, and 3) CR.
Requirements:
Hardware Requirement:-
Hard Disk - 20 GB
Monitor - 15’ Color with VGI card support
RAM - Minimum 256 MB
Processor - Pentium III and Above (or) Equivalent
Processor speed - Minimum
500 MHz
Software
Requirement:-
Operating System - Windows
XP Prof
Platform - Visual Studio .Net 2005 & Above
Database - SQL Server 2000 & above
Languages - C#.Net
With or without GSM Modem
Interface.
No comments:
Post a Comment