Filters








75 Hits in 3.6 sec

Data Exfiltration via Multipurpose RFID Cards and Countermeasures [article]

Zheng Zhou, Weiming Zhang, Nenghai Yu
2019 arXiv   pre-print
Then, the reasons for the existence of such channels are discussed. To eliminate this type of covert channels, a new authentication protocol between RFID cards and card readers are proposed.  ...  In the paper, using the RFID cards in MIFARE Classic and DESFire families, a bidirectional covert channel via multipurpose RFID cards between service providers is built to leak sensitive data between two  ...  Lightweight and privacy-preserving rfid authentication scheme for distributed iot infrastructure with secure localization services for smart city environment.  ... 
arXiv:1902.00676v3 fatcat:a4gegguxkffq7c6wxtkag4di6u

A New Ultra-lightweight Authentication Protocol for Low Cost RFID Tags

Xin Wang, Qingxuan Jia, Xin Gao, Peng Chen, Bing Zhao
2013 Sensors & Transducers  
At present, the problem of security and privacy become a key factor of severely blocking the widespread of its usage.  ...  This paper proposes a new ultra-lightweight RFID authentication protocol with high robustness and execution efficiency.  ...  Hence, the protocol proposed in this paper is highly efficient for low-cost RFID tags. nt te er rn na at ti io on na al l O Of ff fi ic ci ia al l J Jo ou ur rn na al l o of f t th he e I In nt te er rn  ... 
doaj:b24919cd8c6b40679d45696a53b35fe4 fatcat:ubhgzvywebh2hba73vjloyxela

A Methodology for Evaluating Security in Commercial RFID Systems [chapter]

Tiago M. Fernández-Caramés, Paula Fraga-Lamas, Manuel Suárez-Albela, Luis Castedo
2017 Radio Frequency Identification  
Although RFID has become a widespread technology, the developers of numerous commercial systems have not taken care of security properly.  ...  The results obtained show that the consistent application of the methodology allows researchers to perform security audits easily and detect, mitigate, or avoid risks and possible attacks.  ...  Acknowledgements This work has been funded by the Spanish Ministry of Economy and Competitiveness under grants TEC2013-47141-C4-1-R and TEC2015-69648-REDC. Author details Tiago M.  ... 
doi:10.5772/64844 fatcat:dwcpxjj2kjaajh3pf4ngyxk7ji

A Lightweight Identification Protocol for Embedded Devices [article]

Abdoulaye Mbaye, Abdoul Aziz Ciss, Oumar Niang
2014 arXiv   pre-print
The task of this paper is to introduce a new lightweight identification protocol based on biometric data and elliptic curves.  ...  Our scheme is light, very fast, secure and robust against all the known attacks on identification protocol. Therefore, one can use it in any constraint device such as embedded systems.  ...  Introduction In the era of ubiquitous computing, the need to know the identity and authenticity of the entity with which we communicate and ensure the privacy of users has become essential.  ... 
arXiv:1408.5945v2 fatcat:vv6yatca2zagbilt4hq2adtjzu

Privacy-preserving multi-factor authentication and role-based access control scheme for the E-healthcare system

Mohammad Fareed, Ali A. Yassin
2022 Bulletin of Electrical Engineering and Informatics  
This paper proposes a privacy-preserving using RBAC and smart multi-factor authentication for the healthcare system to overcome the limitation flaw in previous schemes such as security risk tolerance,  ...  The proposed scheme conducted two thorough formal security proofs for the proposed work based on informal analysis and the Scyther tool.  ...  SHA 256 is a part of the SHA 2 family of algorithms.  ... 
doi:10.11591/eei.v11i4.3658 fatcat:5az5f3unznf6hdwy74ttrz5zzi

Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis

Christine Hennebert, Jessye Dos Santos
2014 IEEE Internet of Things Journal  
The privacy issue is also addressed and different ways to hide the device identity are discussed.  ...  This paper describes the current protocols and security solutions that can be deployed in constrained resources.  ...  ACKNOWLEDGEMENTS This research work was supported by the FP7 European projects BUTLER under contract no. 287901 and SocIoTal under contract no. 609112.  ... 
doi:10.1109/jiot.2014.2359538 fatcat:nzb5oet5rfbe7kcrgn56cvhvym

Physical Unclonable Functions (PUF) for IoT Devices [article]

Abdulaziz Al-Meer, Saif Al-Kuwari
2022 arXiv   pre-print
In this survey we provide a comprehensive review of the state-of-the-art of PUF, its architectures, protocols and security for IoT.  ...  PUF is promising solution for lightweight security, where the manufacturing fluctuation process of IC is used to improve the security of IoT as it provides low complexity design and preserves secrecy.  ...  Acknowledgments This work is partially funded by the G5797 "Developing Physical-Layer Security Schemes for Internet of Things Networks" project under the NATO's Science for Peace Programme.  ... 
arXiv:2205.08587v1 fatcat:ytp7ot6pc5asbi46qxsdeewg2u

Secure Data Encryption for Cloud-Based Human Care Services

Taehwan Park, Hwajeong Seo, Sokjoon Lee, Howon Kim
2018 Journal of Sensors  
Finally, the proposed implementations achieved 3.5 cycles/byte and 4.6 cycles/byte for Simeck32/64 and Simeck64/128 encryption, respectively.  ...  In order to accelerate the performance, an adaptive encryption technique is also exploited for load balancing of the resulting big data.  ...  Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper. Acknowledgments  ... 
doi:10.1155/2018/6492592 fatcat:gknjhurljjhaddkmdahgb5ozu4

State of the Art on Mobility and Transport data protection technologies

BLANCO-JUSTICIA Alberto
2021 Zenodo  
This document describes the legal provisions and risks associated with the collection of personal mobility and transportation data, along with design strategies and technologies to reduce or eliminate  ...  We should note that most of the authors' choices for the value of 𝛿𝛿 in the presented experiments are not aligned with the restrictions set on 𝛿𝛿 by Dwork and Roth 130 , that required 𝛿𝛿 to be  ...  The authors propose two different approaches: Sampling First and Interpolation (SFI) and Interpolation First and Sampling (IFS), both achieving (0, 𝛿𝛿)-differential privacy.  ... 
doi:10.5281/zenodo.6811373 fatcat:qwcyotcs3bds5jswcc6lgbonuq

The practice of online social networking of the physical world

Andreas Kamilaris, George Taliadoros, Andreas Pitsillides, Diomidis Papadiomidous
2012 International Journal of Space-Based and Situated Computing (IJSSC)  
A big challenge for the web is to become ubiquitous, blended with the everyday life of people.  ...  where neighbours compete for energy conservation; and a social application that allows people to compare their electricity footprint with their friends and their community.  ...  RFID tags, smart cards, and QR codes).  ... 
doi:10.1504/ijssc.2012.050007 fatcat:eumw4unynjachmslrhijlxzyv4

VLSI Characterization of the Cryptographic Hash Function BLAKE

Luca Henzen, Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan
2011 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
Cryptographic hash functions are used to protect information integrity and authenticity in a wide range of applications. After the discovery of weaknesses in the current deployed standards, the U.S.  ...  In this paper, we investigate highspeed and low-area hardware architectures of one of the 14 "second-round" candidates in this competition: BLAKE.  ...  ACKNOWLEDGMENT The authors would like to thank F. Carbognani for his support during the VLSI design and P. Meinerzhagen for his valuable effort in the memory analysis.  ... 
doi:10.1109/tvlsi.2010.2060373 fatcat:73tbrnvi3rgo7hemjcthkdjymu

A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates [article]

Sachin Kumar, Jawad Haj-Yihia, Mustafa Khairallah, Anupam Chattopadhyay
2017 IACR Cryptology ePrint Archive  
For accurate evaluation of CAE-SAR candidates, it is of utmost importance to have independent and thorough optimization for each of the ciphers both for their corresponding hardware and software implementations  ...  Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography because of its ability to provide integrity, confidentiality and authenticity at the same time.  ...  Related work and motivation AEAD Ciphers: Authenticated Encryption (AE) is a concept that emerged in the cryptographic community in early 2000s, due to the need for both data privacy and authentication  ... 
dblp:journals/iacr/KumarHKC17 fatcat:pi34jg2mmjbc3jehzai5vwjrhe

Dismantling DST80-based Immobiliser Systems

Lennert Wouters, Jan Van Den Herrewegen, Flavio D. Garcia, David Oswald, Benedikt Gierlichs, Bart Preneel
2020 Transactions on Cryptographic Hardware and Embedded Systems  
However, in many cases the underlying cryptographic primitives used to authenticate a transponder are proprietary in nature and thus not open to public scrutiny.  ...  We target the key loading procedure and investigate the practical applicability in the context of portability.  ...  Acknowledgments This work was supported in part by the Research Council KU Leuven C1 on Security and Privacy for Cyber-Physical Systems and the Internet of Things with contract number C16/15/058.  ... 
doi:10.13154/tches.v2020.i2.99-127 dblp:journals/tches/WoutersHGOGP20 fatcat:2amg5kgufndcndatf64m3gadpu

Dismantling DST80-based Immobiliser Systems

Lennert Wouters, Jan Van den Herrewegen, Flavio D. Garcia, David Oswald, Benedikt Gierlichs, Bart Preneel
2020 Transactions on Cryptographic Hardware and Embedded Systems  
However, in many cases the underlying cryptographic primitives used to authenticate a transponder are proprietary in nature and thus not open to public scrutiny.  ...  We target the key loading procedure and investigate the practical applicability in the context of portability.  ...  Acknowledgments This work was supported in part by the Research Council KU Leuven C1 on Security and Privacy for Cyber-Physical Systems and the Internet of Things with contract number C16/15/058.  ... 
doi:10.46586/tches.v2020.i2.99-127 fatcat:wncimbgjobagphzu6547urx7gy

FPQA implementation of modified Elliptic Curve Digital Signature Algorithm

Kamalakannan Venkataraman, Tamilselvan Sadasivam
2019 Facta universitatis - series Electronics and Energetics  
Therefore, this algorithm can be applied for the devices being connected in perceptual layer of the IoT.  ...  In this paper, implementation of the original Elliptic Curve Digital Signature Algorithm and its variants are considered and evaluated in terms of the security level and computational cost.  ...  If designers considered the privacy implications of unencrypted data, they have limited options for encryption because of this hardware platform.  ... 
doi:10.2298/fuee1901129v fatcat:epxt2hymvffmjnai73foun5w2q
« Previous Showing results 1 — 15 out of 75 results