Messaging Protocols: Difference between revisions

From ACCX Products Wiki
Jump to navigation Jump to search
 
(10 intermediate revisions by the same user not shown)
Line 1: Line 1:
===Candidate Protocols for Messaging and Encapsulation===
===Candidate Protocols for Messaging and Encapsulation===
====Low-level Signalling and anti-collision====
====Low-level Signaling====
The purpose of the low-level protocol is to provide primatives such as:
*Message Encapsulation appropriate for different mediums
**RS-232
**RS-485
**Ethernet
**SMS/Cellular
*Polling, and unique identification protocol
**Uniquely identify all devices on the network
**Handle collisions
 
=====Protocol Candidates=====
* [http://www.modbus.org MODBUS - Industrial Control protocol, works over serial or Ethernet]
* [http://www.modbus.org MODBUS - Industrial Control protocol, works over serial or Ethernet]
** [http://www.modbus.org/docs/Modbus_over_serial_line_V1.pdf MODBUS over Serial]
** [http://www.modbus.org/docs/Modbus_over_serial_line_V1.pdf MODBUS over Serial]
====End to end session protocol====
The session protocol is responsible for ensuring message fidelity, security and standardizing the protocol for 2-way transactions.
=====Considerations=====
*Ideally, session is encrypted and authenticated at all levels
**User should know they are interacting with a legitimate terminal
**Token should know that it is talking to a legitimate reader
**Reader should not leak any secrets during transaction
**Secrets should not be subject to interception between reader and server/panel
***Physically secure wiring/network
***Secure/encrypted protocols
*Messages should be not be able to vulnerable to session replay
**Time stamping/serializing of messages
*Messages should not be subject to intentional or accidental alteration in transit
**Message CRC and cryptographic signing/MAC protocol
=====Protocols and Session Flow=====
*[[Example Message Flow]]
*[[Open Source Access Control Messaging Standard]]
====Protocol Examples and White Papers====
*[http://www.autoidlabs.org/uploads/media/AUTOIDLABS-WP-HARDWARE-048.pdf A Mutual Authentication Protocol for RFID Using IDEA]
*[http://csrc.nist.gov/publications/nistpubs/800-98/SP800-98_RFID-2007.pdf NIST Guidelines for Securing RFID]
*[https://www.cdt.org/privacy/20060501rfid-best-practices.php CDT Privacy Best Practices for Deployment of RFID Technology]

Latest revision as of 11:35, 28 June 2012

Candidate Protocols for Messaging and Encapsulation

Low-level Signaling

The purpose of the low-level protocol is to provide primatives such as:

  • Message Encapsulation appropriate for different mediums
    • RS-232
    • RS-485
    • Ethernet
    • SMS/Cellular
  • Polling, and unique identification protocol
    • Uniquely identify all devices on the network
    • Handle collisions
Protocol Candidates

End to end session protocol

The session protocol is responsible for ensuring message fidelity, security and standardizing the protocol for 2-way transactions.

Considerations
  • Ideally, session is encrypted and authenticated at all levels
    • User should know they are interacting with a legitimate terminal
    • Token should know that it is talking to a legitimate reader
    • Reader should not leak any secrets during transaction
    • Secrets should not be subject to interception between reader and server/panel
      • Physically secure wiring/network
      • Secure/encrypted protocols
  • Messages should be not be able to vulnerable to session replay
    • Time stamping/serializing of messages
  • Messages should not be subject to intentional or accidental alteration in transit
    • Message CRC and cryptographic signing/MAC protocol
Protocols and Session Flow

Protocol Examples and White Papers