{"title":"基于Arduino Mega 2560的带有时间戳协议的改进RAP-WOTA访问控制原型","authors":"Nia Hindarsih, Dwi Novazrianto, Fauzan Budi Setiawan, Esa Egistian Hartadi, Rizka Khairunnisa","doi":"10.1109/ICRAMET53537.2021.9650469","DOIUrl":null,"url":null,"abstract":"The scheme of the RFID Authentication Encryption Protocol Without Tag Anonymity (RAP-WOTA) protocol was introduced by Rajaguru K. et al. in 2018. This protocol is claimed to provide message confidentiality, message authentication, tag anonymity, de-synchronization, mutual authentication, and forward secrecy. Syafrilah et al. found a vulnerability in the RAP-WOTA protocol and modified it by adding a timestamp, which has been tested to overcome the vulnerability. However, its use in actual hardware has never been carried out in further research. Access control is very important because it is one of the first lines of defense in the fight against unauthorized access to systems. To access a room with a high level of security, in addition to user authentication, authentication of access control devices is also required. Therefore, in this study, the implementation of the modified RAP-WOTA protocol with timestamp was carried out to verify that the protocol could be applied to RFID devices for room access control. From the results of the implementation, the average protocol processing time is 27.16 seconds. The maximum communication is 140 cm. Also, this protocol is proven safe from replay attacks.","PeriodicalId":269759,"journal":{"name":"2021 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Access Control Prototype using Modified RAP-WOTA with Timestamp Protocol Based on Arduino Mega 2560\",\"authors\":\"Nia Hindarsih, Dwi Novazrianto, Fauzan Budi Setiawan, Esa Egistian Hartadi, Rizka Khairunnisa\",\"doi\":\"10.1109/ICRAMET53537.2021.9650469\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The scheme of the RFID Authentication Encryption Protocol Without Tag Anonymity (RAP-WOTA) protocol was introduced by Rajaguru K. et al. in 2018. This protocol is claimed to provide message confidentiality, message authentication, tag anonymity, de-synchronization, mutual authentication, and forward secrecy. Syafrilah et al. found a vulnerability in the RAP-WOTA protocol and modified it by adding a timestamp, which has been tested to overcome the vulnerability. However, its use in actual hardware has never been carried out in further research. Access control is very important because it is one of the first lines of defense in the fight against unauthorized access to systems. To access a room with a high level of security, in addition to user authentication, authentication of access control devices is also required. Therefore, in this study, the implementation of the modified RAP-WOTA protocol with timestamp was carried out to verify that the protocol could be applied to RFID devices for room access control. From the results of the implementation, the average protocol processing time is 27.16 seconds. The maximum communication is 140 cm. Also, this protocol is proven safe from replay attacks.\",\"PeriodicalId\":269759,\"journal\":{\"name\":\"2021 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET)\",\"volume\":\"73 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRAMET53537.2021.9650469\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRAMET53537.2021.9650469","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Access Control Prototype using Modified RAP-WOTA with Timestamp Protocol Based on Arduino Mega 2560
The scheme of the RFID Authentication Encryption Protocol Without Tag Anonymity (RAP-WOTA) protocol was introduced by Rajaguru K. et al. in 2018. This protocol is claimed to provide message confidentiality, message authentication, tag anonymity, de-synchronization, mutual authentication, and forward secrecy. Syafrilah et al. found a vulnerability in the RAP-WOTA protocol and modified it by adding a timestamp, which has been tested to overcome the vulnerability. However, its use in actual hardware has never been carried out in further research. Access control is very important because it is one of the first lines of defense in the fight against unauthorized access to systems. To access a room with a high level of security, in addition to user authentication, authentication of access control devices is also required. Therefore, in this study, the implementation of the modified RAP-WOTA protocol with timestamp was carried out to verify that the protocol could be applied to RFID devices for room access control. From the results of the implementation, the average protocol processing time is 27.16 seconds. The maximum communication is 140 cm. Also, this protocol is proven safe from replay attacks.