Comparative analysis of authentication techniques to Secure Low Level Reader Protocol (LLRP) connection

  title={Comparative analysis of authentication techniques to Secure Low Level Reader Protocol (LLRP) connection},
  author={Shreen Abd Elfatah Elshrief and Rowayda A. Sadek and Atef Z. Ghalwash},
  journal={2014 31st National Radio Science Conference (NRSC)},
Radio Frequency Identification (RFID) is a technology that has risen to prominence over the past decade. EPCglobal Network provides a standardized way to collect, store, and distribute data among various organizations. Low-Level Reader Protocol (LLRP) is a standard interface between RFID Readers and Clients. LLRP implements Transport Layer Security (TLS) to setup a secure connection. Authentication techniques in TLS protocol are mainly based on public key cryptography. Recently TLS supports… 

Figures and Tables from this paper


Performance evaluation of a secure Low Level Reader Protocol(LLRP) connection
The overhead of securing a LLRP connection using TLS is quantified and a detailed analysis of the results is undertaken to determine the TLS cipher suites and parameters that provide the best compromise between the level of security and performance.
Performance evaluation of public-key cryptosystem operations in WTLS protocol
  • A. Levi, E. Savaş
  • Computer Science
    Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003
  • 2003
An analytical performance model for public-key cryptosystem operations in WTLS protocol is developed and it has been observed that ECC (elliptic curve cryptography) performs better than its rival RSA cryptosSystem inWTLS.
Securing industry-wide EPCglobal Network with WS-Security
This first proposed secure framework integrating web services and WSS technology to provide an XML‐based abstraction layer for established security technologies that delivers confidentiality, integrity, authentication, authorization, and non‐repudiation in EPCglobal Network is presented.
Integrating elliptic curve cryptography into the web's security infrastructure
Elliptic Curve Cryptography (ECC) is offered as a suitable alternative to RSA and the integration of this technology into several key components of the Web's security infrastructure is described.
Beginning Cryptography with Java
The architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages are covered.
RFID reader agent based on low level reader protocol (LLRP) standard
  • M.S. thesis, Dept. Comp. Sci. &Comp. Eng., Univ. of Arkansas, United States, 2007.
  • 2007
RFID ( Radio Frequency Identification ) : Principles and Applications
The history of RFID technology and automatic identification systems is presented, major RFID applications are summarized, and a primer on RFID fundamental principles is presented.
RFID ( Radio Frequency Identification ) : Principles and Applications , MIT CSAIL [ 2 ] The EPCglobal Architecture Framework , 2007 [ Online ] . EPCglobal Standard
  • Reader Protocol Standard , Version 1 . 1 Ratified Standard June 21
  • 2007
September) “A Brief Introduction to Low Level Reader Protocol (LLRP)
  • 2007
Security assessment of EPCglobal architecture framework
  • 2006