Book ChapterDOI
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
Pedro Peris-Lopez,Julio C. Hernandez-Castro,Juan M. Estevez-Tapiador,Arturo Ribagorda +3 more
- pp 352-361
Reads0
Chats0
TLDR
This work proposes an extremely efficient lightweight mutual-authentication protocol that offers an adequate security level for certain applications and can be implemented even in the most limited low-cost RFID tags, as it only needs around 150 gates.Abstract:
RFID tags are devices of very limited computational capabilities, which only have 250-3K logic gates that can be devoted to security-related tasks Many proposals have recently appeared, but all of them are based on RFID tags using classical cryptographic primitives such as PRNGs, hash functions, block ciphers, etc We believe this assumption to be fairly unrealistic, as classical cryptographic constructions lie well beyond the computational reach of very low-cost RFID tags A new approach is necessary to tackle this problem, so we propose an extremely efficient lightweight mutual-authentication protocol that offers an adequate security level for certain applications and can be implemented even in the most limited low-cost RFID tags, as it only needs around 150 gates.read more
Citations
More filters
Journal ArticleDOI
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity
TL;DR: A new ultralightweight RFID authentication protocol is proposed that provides strong authentication and strong integrity protection of its transmission and of updated data and can resist all the possible attacks.
Journal ArticleDOI
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
Debiao He,Sherali Zeadally +1 more
TL;DR: Although most RFID authentication schemes cannot satisfy all security requirements and have satisfactory performance, it is found that there are three recently proposed ECC-based authentication schemes suitable for the healthcare environment in terms of their performance and security.
Journal ArticleDOI
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
Aakanksha Tewari,Brij B. Gupta +1 more
TL;DR: This work has proposed an ultra-lightweight mutual authentication protocol which uses only bitwise operation and thus is very efficient in terms of storage and communication cost and thus the computation overhead is very low.
Book ChapterDOI
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
TL;DR: Gossamer is presented, a new protocol inspired by the recently published SASI scheme that is designed to avoid the problems of the past and is examined in some deep its security and performance.
Journal ArticleDOI
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
Yi-Pin Liao,Chih-Ming Hsiao +1 more
TL;DR: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol that can achieve mutual authentication and satisfy the essential requirements of RFID system is proposed.
References
More filters
Book ChapterDOI
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
TL;DR: Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.
Book ChapterDOI
Strong Authentication for RFID Systems using the AES Algorithm
TL;DR: A novel approach of an AES hardware implementation which encrypts a 128-bit block of data within 1000 clock cycles and has a power consumption below 9 μA on a 0.35 μm CMOS process is introduced.
Journal Article
Strong authentication for RFID systems using the AES algorithm
TL;DR: In this article, the authors presented an authentication protocol which serves as a proof of concept for authenticating an RFID tag to a reader device using the Advanced Encryption Standard (AES) as cryptographic primitive.
BookDOI
Cryptographic Hardware and Embedded Systems - CHES 2002
TL;DR: A technology to block a new class of attacks on secure microcontrollers and smartcards whereby a logical 1 or 0 is not encoded by a high or low voltage on a single line, but by (HL or (LH) on a pair of lines.
Book ChapterDOI
RFID Systems and Security and Privacy Implications
TL;DR: The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes with research opportunities for experts in cryptography and information security.