11 Hits in 6.5 sec

Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol [chapter]

Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. E. Tapiador, Arturo Ribagorda
2009 Lecture Notes in Computer Science  
The design of ultralightweight authentication protocols that conform to low-cost tag requirements is imperative.  ...  Specifically, this new protocol is designed to avoid the problems of the past, and we examine in some deep its security and performance. tags."  ...  The price to be paid, of course, is the throughput (number of authenticated tags per second) of the Gossamer protocol.  ... 
doi:10.1007/978-3-642-00306-6_5 fatcat:4r5kxuio5rcp5my3azaqhnsd4e

Cryptanalysis of Sulma, An Ultralightweight Mutual Authentication Protocol for Low-Cost RFID Tags

Mahdi Azizi, Nasour Bagheri
2011 International Journal of UbiComp  
Recently, Kianersi et al. have proposed an ultra-lightweight mutual authentication protocol for low-cost RFID tags, entitled SULMA.  ...  They have claimed that the SULMA protocol is secure against most of the known attacks for an RFID protocol; includes traceability attack, passive attacks and desynchronization.  ...  CONCLUSIONS In this paper, we have analysed the security of a recently proposed ultra-lightweight mutual authentication protocol for low-cost RFID tags entitled as SULMA [19] .  ... 
doi:10.5121/iju.2011.2402 fatcat:rjtkotxp25d6habqobp74syyey

Security Flaws in a Recent Ultralightweight RFID Protocol [article]

Pedro Peris-Lopez, Julio C. Hernandez-Castro, J. M. E. Tapiador and Jan C. A. van der Lubbe
2009 arXiv   pre-print
In 2006, Peris-Lopez et al. [1, 2, 3] initiated the design of ultralightweight RFID protocols -with the UMAP family of protocols- involving only simple bitwise logical or arithmetic operations such as  ...  The SASI protocol represented a milestone in the design of ultralightweight protocols, although certain attacks have been published against this scheme [5, 6, 7].  ...  field of lightweight cryptography for low-cost RFID tags.  ... 
arXiv:0910.2115v1 fatcat:mwkssqvocvbghdmoewuxzu4lre

MUMAP: Modified Ultralightweight Mutual Authentication protocol for RFID enabled IoT networks

Mehedi Hasan Raju, Mosabber Uddin Ahmed, Md Atiqur Rahman Ahad
2021 Journal of the Institute of Industrial Applications Engineers  
The proposed protocol aimed to reduce memory requirements in the authentication process for low-cost RFID tags with limited resources.  ...  On the other hand, performance analysis indicates that it is an effective protocol to use in low-cost RFID tags.  ...  Lightweight protocols carry a cyclic redundancy check (CRC) and a lightweight PRNG check. Low-cost RFID tags have an insubstantial number of resources and drawbacks for advanced computation.  ... 
doi:10.12792/jiiae.9.33 fatcat:qjbyrqql4nfjvhvmugn45kc6ay

PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol

Ramzi Bassil, Wissam El-Beaino, Wassim Itani, Ayman Kayssi, Ali Chehab
2013 International Journal of RFID Security and Cryptography  
Then, a novel approach to achieve mutual authentication for ultra-lightweight tags is proposed using Physically Unclonable Functions (PUFs).  ...  As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks.  ...  PUFs and LFSRs are very efficient in hardware and particularly suitable for the low-cost RFID tags.  ... 
doi:10.20533/ijrfidsc.2046.3715.2013.0008 fatcat:riihomjxnnfufnqfo5pbzrqmsm

A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks

Piotr Książak, William Farrelly, Kevin Curran
2014 International Journal of Information Security and Privacy  
The Gossamer Protocol is additionally used as a means of exchanging session keys for use with the SEA encryption protocol.  ...  ENDNOTES 1 L denotes the length of one key or the IDS in bits. 96-bits in the case of the EPC RFID specifications. 2 Data freshness ensures that the data received is fresh and the adversary cannot replay  ...  Infrastructure Wireless Sensor Network (IWSN) Protocols Ultralightweight protocols, which were designed for low-cost RFID systems, rely on minimalistic cryptography techniques and provide a viable alternative  ... 
doi:10.4018/ijisp.2014100104 fatcat:roopfg6i7ndbvhwk7kicio7ir4

Ultra-lightweight Authentication [chapter]

Xavier Carpent, Paolo D'Arco, Roberto De Prisco
2021 Security of Ubiquitous Computing Systems  
We use an abstract framework for modeling the protocols proposed over the years, in order to discuss their design strategies and the security and privacy properties they aim to achieve.  ...  AbstractIn this chapter we provide a critical look at the state of the art in ultra-lightweight authentication protocols.  ...  Passive RFID tags can hardly afford such a component. There exist low-cost pseudo-random generators, but they still pose a substantial burden for an RFID tag.  ... 
doi:10.1007/978-3-030-10591-4_6 fatcat:2dqwgrwef5ellgfzwchwhnbuyi

Mersenne twister-based RFID authentication protocol

Mehmet Hilal ÖZCANHAN, Gökhan DALKILIÇ
2015 Turkish Journal of Electrical Engineering and Computer Sciences  
This work presents an ultra-lightweight, cryptographic, mutual authentication protocol for radio-frequency identification (RFID) tags. The proposed scheme is more secure than its predecessors.  ...  Apart from previous work, our scheme is compared and contrasted against the results of some popular hashing and encryption algorithms, recommended for RFID tags.  ...  of low-cost tags are very limited [5, 9] .  ... 
doi:10.3906/elk-1212-95 fatcat:dsioh6hpuzcs5g3lx6rnga4dy4

Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol

Lijun Gao, Lu Zhang, Feng Lin, Maode Ma
2019 IEEE Access  
In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols have security risks, and two targeted attack methods are proposed.  ...  The grouping index method can effectively improve the ability to locate tags in a large database and enhance the practicability of the protocol.  ...  The study on the security protocol is divided into two types: (1) one type is the low-cost security privacy protection protocol with low-cost operations such as AND, OR, XOR, and CRC, the disadvantage  ... 
doi:10.1109/access.2018.2890282 fatcat:4fhlptrq4jgotodzzgistc2zty

A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol

David F. Barrero, Julio César Hernández-Castro, Pedro Peris-Lopez, David Camacho, María D. R-Moreno
2012 Expert systems  
Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context.  ...  There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra-lightweight) RFID environments  ...  He has made research stays in the Centre National d'Etudes Spatiales (CNES) in Toulouse, France,  ... 
doi:10.1111/j.1468-0394.2012.00652.x fatcat:nekbrmkninf7hosh5rlivpkree

Aalborg Universitet Lightweight Cryptography for Passive RFID Tags Lightweight Cryptography for Passive RFID Tags

David, Mathieu David, Moderator Assoc, Kiel Jensen, Mathieu David, Niels Vej, Aalborg Denmark
2011 unpublished
We select two of these branches, ultralightweight cryptography and symmetric-key cryptography, and propose a cryptographic primitive in each of them.  ...  In the case of symmetric-key cryptography, we propose a stream cipher that has a footprint among the smallest in the published literature and aims at being implemented on printed electronics RFID tags.  ...  A similar version was also published in [87] with accompanying protocols for low-cost tags.  ...