188 Hits in 5.2 sec

Strong Authentication and Strong Integrity (SASI) Is Not That Strong [chapter]

Gildas Avoine, Xavier Carpent, Benjamin Martin
2010 Lecture Notes in Computer Science  
The result dismantles SASI and, more generally, provides a new approach that threatens ultra-lightweight authentication protocols.  ...  In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID.  ...  In [5] , Chien proposed another very lightweight authentication protocol providing Strong Authentication and Strong Integrity, so-called SASI.  ... 
doi:10.1007/978-3-642-16822-2_5 fatcat:tec3up6xwva55ff5esdazh67se

Security Analysis of the SASI Protocol

Tianjie Cao, E. Bertino, Hong Lei
2009 IEEE Transactions on Dependable and Secure Computing  
In this paper, we show that the ultralightweight strong authentication and strong integrity (SASI) protocol has two security vulnerabilities, namely, denial-of-service and anonymity tracing based on a  ...  The former permanently disables the authentication capability of a RFID tag by destroying synchronization between the tag and the RFID reader.  ...  (BK2007035), and the Science and Technology Foundation of CUMT.  ... 
doi:10.1109/tdsc.2008.32 fatcat:xsnofcnrvnbstdsnt5jy4fzpou

A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash

Umar Mujahid, M. Najam-ul-Islam, Atif Raza Jafri, Qurat-ul-Ain, M. Ali Shami
2016 International Journal of Distributed Sensor Networks  
In this paper, we present a more sophisticated UMAP to provide Strong Authentication and Strong Integrity (SASI) using recursive hash function.  ...  To the best of our knowledge, this is the first FPGA and ASIC implementation of any ultralightweight RFID authentication protocol.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2016/9648971 fatcat:kd2yvbzwi5echlmp6cc3lbr74u

Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations [article]

Julio C. Hernandez-Castro, Juan M. E. Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater
2008 arXiv   pre-print
In this work we present the first passive attack over the SASI lightweight authentication protocol with modular rotations.  ...  We also present results on the attack's efficiency, and some ideas to secure this version of the SASI protocol.  ...  Introduction In 2007 Hung-Yu Chien published a very interesting ultralightweight authentication protocol providing Strong Authentication and Strong Integrity (SASI) for very low-cost RFID tags [1] .  ... 
arXiv:0811.4257v1 fatcat:zt24mnkjinfc5pdtq4fw4swsoy

A General Comparison of Symmetric and Asymmetric Cryptosystems for WSNs and an Overview of Location Based Encryption Technique for Improving Security

Swapna B Sasi
2014 IOSR Journal of Engineering  
To ensure the integrity and to protect data from unauthorised accesses some method of cryptographic technologies must be employed.  ...  A review of all these systems is described in this paper.  ...  It includes data confidentiality, data integrity, authentication, and non-repudiation. 1.1.1 Confidentiality: it provides a set of rules and regulations or a promise that limits access or places restrictions  ... 
doi:10.9790/3021-04330104 fatcat:puj6sabvengcjfnwapbrmepq2q

Review on Cross Layer Design Approach

M G Prajwal, Rakesh Kumar H J1, Prathap N, Smitha Sasi
2019 Zenodo  
In this article, justification the role of Cross-layer approach is presented, and difficult analysis of it is done to identify its limitations.  ...  It breaches the basic principles of layered approach and may compromise the robust nature of the Internet.  ...  Physical layer authentication for the detection of the intruder when integrated with the crosslayer design can improve the security of the wireless networks.  ... 
doi:10.5281/zenodo.2647171 fatcat:obv5dhcvyfcxhpmdwf6ppybyvy

ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments

Sajin Sasy, Ian Goldberg
2019 Proceedings on Privacy Enhancing Technologies  
This requirement is in place to avoid epistemic attacks, in which adversaries who know which parts of the network certain clients do and do not know about can rule in or out those clients from being responsible  ...  We analyse the requirements to actually deploy such a scheme today and conclude that it would only require a small fraction (<2.5%) of the relays to have the required hardware support; moreover, these  ...  The authors thank NSERC for grants RGPIN-03858 and STPGP-463324, and the Royal Bank of Canada for funding this research.  ... 
doi:10.2478/popets-2019-0050 dblp:journals/popets/SasyG19 fatcat:ia5hakytxjbtxkqui3aczzjlva

Photosystem II Extrinsic Proteins and Their Putative Role in Abiotic Stress Tolerance in Higher Plants

Shina Sasi, Jelli Venkatesh, Rawya Daneshi, Mayank Gururani
2018 Plants  
PSII extrinsic proteins include PsbO, PsbP, PsbQ, and PsbR in higher plants, and these are required for oxygen evolution under physiological conditions.  ...  Abiotic stress remains one of the major challenges in managing and preventing crop loss.  ...  Gene coding for PsbR is not found in red algae or cyanobacteria. It was suggested that PsbR is designated on the PSII luminal side, but this has not been experimentally tested.  ... 
doi:10.3390/plants7040100 pmid:30441780 pmcid:PMC6313935 fatcat:42dxleqm7fbnbngo2j6poq455a

SULMA: A Secure Ultra Light-Weight Mutual Authentication Protocol for Lowcost RFID Tags

Mehrdad Kianersi, Mahmoud Gardeshi, Mohammad Arjmand
2011 International Journal of UbiComp  
This family does not provide significant security due to limitations that exist in using strong cryptographic primitives, and show much vulnerability against attacks.  ...  In this paper, we introduce a new ultra light-weight mutual authentication protocol with inspiring Gossamer protocol that proposed by Peris et al.  ...  Acknowledgement This work is supported by the education & Research Institute for ICT, Tehran, Iran.  ... 
doi:10.5121/iju.2011.2202 fatcat:xj73prrsnjdjvjyack2l2a623i

SURV: Shelled Ultralightweight Randomized Value Authentication Protocol for Low-Cost RFID Tags

Muaway Naser, Yazn Alshamaila, Rahmat Budiarto, Pedro Peris-Lopez
2015 International Journal of Computer and Electrical Engineering  
In other words, the probability of zeros (ones for the OR operation) is 3 /4. The Strong Authentication and Strong Integrity (SASI) protocol was proposed by H. Chien in 2007 [15] .  ...  SASI protocol came as an improvement to UMAP, featuring a Rot() function that was not a triangular function, which is considered an interesting addition to arrive at the assumed secure protocol.  ...  This is because each message is based on random numbers that are changed in every successful authentication session.  ... 
doi:10.17706/ijcee.2015.7.3.206-214 fatcat:fwotsizeabbmlgc5qzzvg2q3ku

Salicylate poisoning in children: report of three cases

K Maitland, CO Musumba, AO Pamba, PA Sasi, M English
2004 East African Medical Journal  
The fall in the male:female ratio is a strong indication of a rise in KS among female patients. A further study is necessary to elucidate the true impact of AIDS on the pattern of KS in the country.  ...  However, either mebendazole from the different brands or albendazole is effective in the treatment of ascariasis in areas where trichuriasis is not prevalent.  ...  ACKNOWLEDGEMENTS To East African pharmaceuticals in Addis Ababa for the donation of their mebendazole brand, to the director, teachers and school children of Wondo Wosha and Shasha Kakel Schools and parents  ... 
doi:10.4314/eamj.v81i3.9147 fatcat:hvz6x57k7bhrhgg2zui4exuepu

Validation of a new spectrometer for noninvasive measurement of cardiac output

Marc M. Baum, Sasi Kumar, John A. Moss, Peter D. Wagner
2004 Review of Scientific Instruments  
These results indicate that the portable, low-cost, rugged prototype analyzer discussed here is suitable for measuring cardiac output noninvasively in a point-of-care setting.  ...  The analyzer relies on nondispersive IR absorption spectroscopy as its principle of operation and is configured for extractive ͑side-stream͒ sampling.  ...  While not the same as Q T , this value has functional significance and is itself useful.  ... 
doi:10.1063/1.1764606 fatcat:d3hbphlj45f3jiiho5kmgzlfzm

Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol [chapter]

Julio C. Hernandez-Castro, Juan M. E. Tapiador, Arturo Ribagorda
2008 Communications in Computer and Information Science  
SASI.  ...  We show how an attack based on Simulated Annealing can efficiently recover the tag's secret ID, which is the value the protocol is designed to conceal.  ...  Description of the SASI Protocol In 2007, Chien presented an interesting ultra-lightweight mutual authentication protocol providing Strong Authentication and Strong Integrity (SASI), intended for very  ... 
doi:10.1007/978-3-540-87477-5_62 fatcat:pz7gk5ghbff2dew3pec4urnxs4

Implementing Dynamically Evolvable Communication with Embedded Systems through WEB Services

Sasi Bhanu Jammalamadaka, Vinaya Babu A, Trimurthy A
2016 International Journal of Electrical and Computer Engineering (IJECE)  
</p><p> </p><p>This paper presents an implementation system that is related to dynamically evolvable communication and other sub-systems using web services technologies.</p>  ...  <p>Embedded systems that monitor and control safety and mission critical system are communicated with by a HOST located at a remote location through Internet.  ...  UDDI (Universal Discovery and Integration) is the technology that is included into the fourth layer.  ... 
doi:10.11591/ijece.v6i1.9058 fatcat:6tok2gpchbhhpiwdr2udbteyyy

MUMAP: Modified Ultralightweight Mutual Authentication protocol for RFID enabled IoT networks

Mehedi Hasan Raju, Mosabber Uddin Ahmed, Md Atiqur Rahman Ahad
2021 Journal of the Institute of Industrial Applications Engineers  
On the other hand, performance analysis indicates that it is an effective protocol to use in low-cost RFID tags.  ...  In this paper, an authentication protocol named Modified ultralightweight mutual authentication protocol (MUMAP) has been proposed and cryptanalysed by Juel-Weis challenge.  ...  Chien [2] proposed a new authentication protocol for RFID communication named Strong Authentication and Strong Integrity (SASI) protocol.  ... 
doi:10.12792/jiiae.9.33 fatcat:qjbyrqql4nfjvhvmugn45kc6ay
« Previous Showing results 1 — 15 out of 188 results