Business & Management Studies

Cryptanalysis of RSEAP2 Authentication Protocol Based on RFID for Vehicular Cloud Computing

Cryptanalysis of RSEAP2 Authentication Protocol Based on RFID for Vehicular Cloud Computing

The researchers assess the security of the hash-based and ECC-based RSEAP2 authentication mechanism.

Authors

N. V. S. S. Prabhakar, Department of Mathematics GIS, GITAM Deemed to be University, Visakhapatnam, Andhra Pradesh, India.

Srinivas Jangirala, Associate Professor, Jindal Global Business School, O. P. Jindal Global University, Sonipat, Haryana, India.

Surendra Talari, Department of Mathematics GIS, GITAM Deemed to be University, Visakhapatnam, Andhra Pradesh, India.

Summary

RFID (radio frequency identification) is a technology that enables the connection of physical objects to the Internet of Things (IoT) by using radio waves to transmit data. RFID can connect any physical object to the Internet of things. RFID can connect any physical object to the IoT.

When RFID is widely used and adoption rates rise, security and privacy issues become inescapable. Unauthenticated tags and readers may also send out false or malicious messages, which can be a security risk. It is important to address these issues in order to ensure the safe and secure use of RFID technology. RFID authentication is needed for IoT.

We assess the security of the hash-based and ECC-based RSEAP2 authentication mechanism. RSEAP2 contains serious security weaknesses such as mutual authentication, key extraction challenges, session key agreement, and denial of service threats, availability issues, according to our security analysis. As a result, RSEAP2 in VCC is vulnerable. Furthermore, the computation cost consumption was ≈22.0617, the communication cost at the sending mode was 672 bits, and receiving mode was 512 bits.

Published in: Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security

To read the full article, please click here.