A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
[chapter]
2009
Lecture Notes in Computer Science
The design of ultralightweight authentication protocols that conform to low-cost tag requirements is imperative. ...
Specifically, this new protocol is designed to avoid the problems of the past, and we examine in some deep its security and performance. tags." ...
The price to be paid, of course, is the throughput (number of authenticated tags per second) of the Gossamer protocol. ...
doi:10.1007/978-3-642-00306-6_5
fatcat:4r5kxuio5rcp5my3azaqhnsd4e
Cryptanalysis of Sulma, An Ultralightweight Mutual Authentication Protocol for Low-Cost RFID Tags
2011
International Journal of UbiComp
Recently, Kianersi et al. have proposed an ultra-lightweight mutual authentication protocol for low-cost RFID tags, entitled SULMA. ...
They have claimed that the SULMA protocol is secure against most of the known attacks for an RFID protocol; includes traceability attack, passive attacks and desynchronization. ...
CONCLUSIONS In this paper, we have analysed the security of a recently proposed ultra-lightweight mutual authentication protocol for low-cost RFID tags entitled as SULMA [19] . ...
doi:10.5121/iju.2011.2402
fatcat:rjtkotxp25d6habqobp74syyey
Security Flaws in a Recent Ultralightweight RFID Protocol
[article]
2009
arXiv
pre-print
In 2006, Peris-Lopez et al. [1, 2, 3] initiated the design of ultralightweight RFID protocols -with the UMAP family of protocols- involving only simple bitwise logical or arithmetic operations such as ...
The SASI protocol represented a milestone in the design of ultralightweight protocols, although certain attacks have been published against this scheme [5, 6, 7]. ...
field of lightweight cryptography for low-cost RFID tags. ...
arXiv:0910.2115v1
fatcat:mwkssqvocvbghdmoewuxzu4lre
MUMAP: Modified Ultralightweight Mutual Authentication protocol for RFID enabled IoT networks
2021
Journal of the Institute of Industrial Applications Engineers
The proposed protocol aimed to reduce memory requirements in the authentication process for low-cost RFID tags with limited resources. ...
On the other hand, performance analysis indicates that it is an effective protocol to use in low-cost RFID tags. ...
Lightweight protocols carry a cyclic redundancy check (CRC) and a lightweight PRNG check. Low-cost RFID tags have an insubstantial number of resources and drawbacks for advanced computation. ...
doi:10.12792/jiiae.9.33
fatcat:qjbyrqql4nfjvhvmugn45kc6ay
PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol
2013
International Journal of RFID Security and Cryptography
Then, a novel approach to achieve mutual authentication for ultra-lightweight tags is proposed using Physically Unclonable Functions (PUFs). ...
As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks. ...
PUFs and LFSRs are very efficient in hardware and particularly suitable for the low-cost RFID tags. ...
doi:10.20533/ijrfidsc.2046.3715.2013.0008
fatcat:riihomjxnnfufnqfo5pbzrqmsm
A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks
2014
International Journal of Information Security and Privacy
The Gossamer Protocol is additionally used as a means of exchanging session keys for use with the SEA encryption protocol. ...
ENDNOTES 1 L denotes the length of one key or the IDS in bits. 96-bits in the case of the EPC RFID specifications. 2 Data freshness ensures that the data received is fresh and the adversary cannot replay ...
Infrastructure Wireless Sensor Network (IWSN) Protocols Ultralightweight protocols, which were designed for low-cost RFID systems, rely on minimalistic cryptography techniques and provide a viable alternative ...
doi:10.4018/ijisp.2014100104
fatcat:roopfg6i7ndbvhwk7kicio7ir4
Ultra-lightweight Authentication
[chapter]
2021
Security of Ubiquitous Computing Systems
We use an abstract framework for modeling the protocols proposed over the years, in order to discuss their design strategies and the security and privacy properties they aim to achieve. ...
AbstractIn this chapter we provide a critical look at the state of the art in ultra-lightweight authentication protocols. ...
Passive RFID tags can hardly afford such a component. There exist low-cost pseudo-random generators, but they still pose a substantial burden for an RFID tag. ...
doi:10.1007/978-3-030-10591-4_6
fatcat:2dqwgrwef5ellgfzwchwhnbuyi
Mersenne twister-based RFID authentication protocol
2015
Turkish Journal of Electrical Engineering and Computer Sciences
This work presents an ultra-lightweight, cryptographic, mutual authentication protocol for radio-frequency identification (RFID) tags. The proposed scheme is more secure than its predecessors. ...
Apart from previous work, our scheme is compared and contrasted against the results of some popular hashing and encryption algorithms, recommended for RFID tags. ...
of low-cost tags are very limited [5, 9] . ...
doi:10.3906/elk-1212-95
fatcat:dsioh6hpuzcs5g3lx6rnga4dy4
Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol
2019
IEEE Access
In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols have security risks, and two targeted attack methods are proposed. ...
The grouping index method can effectively improve the ability to locate tags in a large database and enhance the practicability of the protocol. ...
The study on the security protocol is divided into two types: (1) one type is the low-cost security privacy protection protocol with low-cost operations such as AND, OR, XOR, and CRC, the disadvantage ...
doi:10.1109/access.2018.2890282
fatcat:4fhlptrq4jgotodzzgistc2zty
A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol
2012
Expert systems
Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. ...
There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra-lightweight) RFID environments ...
He has made research stays in the Centre National d'Etudes Spatiales (CNES) in Toulouse, France, ...
doi:10.1111/j.1468-0394.2012.00652.x
fatcat:nekbrmkninf7hosh5rlivpkree
Aalborg Universitet Lightweight Cryptography for Passive RFID Tags Lightweight Cryptography for Passive RFID Tags
2011
unpublished
We select two of these branches, ultralightweight cryptography and symmetric-key cryptography, and propose a cryptographic primitive in each of them. ...
In the case of symmetric-key cryptography, we propose a stream cipher that has a footprint among the smallest in the published literature and aims at being implemented on printed electronics RFID tags. ...
A similar version was also published in [87] with accompanying protocols for low-cost tags. ...
fatcat:lrxrgztwvvc7fkwl5efhykdl5a