scispace - formally typeset
Journal ArticleDOI

Lightweight RFID authentication with forward and backward security

Reads0
Chats0
TLDR
A lightweight RFID authentication protocol that supports forward and backward security and uses a pseudorandom number generator (PRNG) that is shared with the backend Server.
Abstract
We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudorandom number generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG. The lookup time is constant, and the protocol can be easily adapted to prevent online man-in-the-middle relay attacks. Security is proven in the UC security framework.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Cryptanalytic attacks on pseudorandom number generators

TL;DR: In this paper, the authors argue that PRNGs are their own unique type of cryptographic primitive, and should be analyzed as such, and demonstrate the applicability of the model (and their attacks) to four real-world PRNG models.
Posted Content

Provably Secure Grouping-proofs for RFID tags.

TL;DR: In this article, the authors investigated the group scanning problem in strong adversarial models and presented a security model for this application and gave a formal description of the attending security requirements, focusing on the privacy (anonymity) of the grouped tags, and/or forward security properties.
Journal ArticleDOI

Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems

TL;DR: This paper proposes a grouping-proofs-based authentication protocol (GUPA) to address the security issue for multiple readers and tags simultaneous identification in distributed RFID systems and shows that GUPA has lower communication overhead and computation load.
Journal ArticleDOI

A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags

TL;DR: The protocol is based on simple (XOR) encryption and 128-bit pseudorandom number generators, operations that can be easily implemented on low-cost passive tags and achieves EPC C1G2 compliance while meeting the security requirements.
Journal Article

Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs

TL;DR: In performance analysis, it is observed that the Zone Routing Protocol (ZRP) outperforms the other MANET routing protocols in terms of network performance and security for the proposed scheme and the probabilistic analysis proves that it is still possible to control outliers in the network despite the new inserted defenses with trust management and limited resources.
References
More filters
Journal Article

PRESENT: An Ultra-Lightweight Block Cipher

TL;DR: In this paper, the authors describe an ultra-lightweight block cipher, present, which is suitable for extremely constrained environments such as RFID tags and sensor networks, but it is not suitable for very large networks such as sensor networks.
Book ChapterDOI

How to construct random functions

TL;DR: A constructive theory of randomness for functions, based on computational complexity, is developed, and a pseudorandom function generator is presented that has applications in cryptography, random constructions, and complexity theory.
Book

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

TL;DR: In this paper, the authors present a comprehensive treatment of power analysis attacks and countermeasures, based on the principle that the only way to defend against such attacks is to understand them.
Book

Power Analysis Attacks: Revealing the Secrets of Smart Cards

TL;DR: This volume explains how power analysis attacks work and provides an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles to decide how to protect smart cards.
Book ChapterDOI

KATAN and KTANTAN -- A Family of Small and Efficient Hardware-Oriented Block Ciphers

TL;DR: A new family of very efficient hardware oriented block ciphers divided into two flavors, which is more compact in hardware, as the key is burnt into the device (and cannot be changed), and achieves encryption speed of 12.5 KBit/sec.