Overview Of Campus Network Security Protocols

728 (2 pages)
Download for Free
Watch out! This text is available online and is used for guidance and inspiration
Download PDF

Radio Frequency Identification (RFID) can do remote identification via using the readers and tags to store and search the data. RFID compose by two components: reader and tag. Although the RFID has a lot of obvious advantages such as unique identification and automation, but it also has critical problems on privacy and security. Readers and tags can be traced by the adversary is the main drawback of the RFID. To avoid this problem, people generate the central database model to provide the protections. Even though it will be more secure by using the database, however it still has the compromise issues for the reader. Recently, people proposed the serverless RFID authentication protocols to provide more flexible service without the connections between reader and database, so that we can efficiently avoid the compromise problems. Because, in serverless RFID, the reader generates a unique access list for tags with a unique identity of the reader which does not have the tag information. Moreover, for the reason of that the RFID protocols can only query one tag at one session from the reader, so serverless RFID search protocol have been generated to let it be more efficiency. However, the serverless protocol still has the tracing problems. So, in this paper, the author first reviews two previous protocols and then suggests a new protocol which is more secure to the tracing problems and less computation overhead than the precious one.

Review of Tan et al. (TSL) and Han et al (HSL)

Basically, the security requirements for the serverless and conventional protocols are the same: Basic Privacy, Untraceability, Cloning Attack, and Physical Attack. In this paper, the author will introduce the lack of ability to avoid from traceable problems of the two protocols. For convenience, the notations table I shows on below.

TSL’s protocol

TSL generate one authentication protocol and three search protocols. They all can be traced by the adversary. When the reader sends its unchangeable identity to tags, the adversary eavesdrops on a communication of a reader and store the unique identity of the reader, then the adversary can recognize the reader whenever he wants.

HSL’s protocol

HSL’s protocol and the TSL’s are similar. The only drawback of this one is that the tags can be easier to track by the adversary.

Proposed Protocol

In this novel protocol, the author generates the access lists in a new way and propose serverless RFID authentication and search protocols based on this new method.

Security Analysis

Basic Privacy: The adversary has the list and tries to query tags in service area, but adversary can’t identify the true tag because Tj replies new response in each session.

Reader Untraceability: More resilient compared with previous protocol.

We will write a unique paper on this topic for you!
Place Order

*No hidden charges

Cloning Attack: The adversary can’t create a fake tag to the reader.

Physical Attack: The adversary can’t generate the fake tag to the readers because the readers have the unique access list.

Search Protocol: The adversary can’t recognize the intended tag between them.

Performance: less computation overhead, the hash function is better than previous protocols.

Strategy and Implementation of Campus Network Security

Nowadays, all the campus has the open resources that can use by students and stuffs, but it has a lot of security issues for the campus institutions. So, it is more and more important to set up an efficient security system to protect those resources. The core of the system is the Information Technology personnel regarding security. Because their computers have a lot of private records with financial, medical, and student data in their daily life. People developed a new conceptual framework: state appropriations, gifts, grants, and technology fees. However, no matter how secure the system is, there are still a lot of unstoppable security problems that the adversaries can stole the records of the users.

Campus network as one of the most important components of the internet, take the most important role to develop the new technology which is the Strategies of Campus Network Security. Because huge numbers of important data are controlled by the campus websites. According to the two-tier network defense system cannot be implemented, solid and multidimensional measures of safety protection should be produced.

Layer security system is the main part of campus server and OS. OS it-self and the OS’s security configuration problem are the main problem of it. Proper personnel roles can reduce the other levels of security vulnerabilities. Campus network authentication system improved the identification of the users and put the management situation simpler and safer in the protection measures.

You can receive your plagiarism free paper paper on any topic in 3 hours!

*minimum deadline

Cite this Essay

To export a reference to this article please select a referencing style below

Copy to Clipboard
Writingbros. (2020, July, 15) Overview Of Campus Network Security Protocols. Retrived September 19, 2020, from https://writingbros.com/essay-examples/overview-of-campus-network-security-protocols/
"Overview Of Campus Network Security Protocols." Writingbros, 15 Jul. 2020, https://writingbros.com/essay-examples/overview-of-campus-network-security-protocols/. Accessed 19 September 2020.
Writingbros. 2020. Overview Of Campus Network Security Protocols., viewed 19 September 2020, <https://writingbros.com/essay-examples/overview-of-campus-network-security-protocols/>
Writingbros. Overview Of Campus Network Security Protocols. [Internet]. July 2020. [Accessed September 19, 2020]. Available from: https://writingbros.com/essay-examples/overview-of-campus-network-security-protocols/
Copy to Clipboard

Need writing help?

You can always rely on us no matter what type of paper you need

Order My Paper

*No hidden charges