A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Data Exfiltration via Multipurpose RFID Cards and Countermeasures
[article]
2019
arXiv
pre-print
Then, the reasons for the existence of such channels are discussed. To eliminate this type of covert channels, a new authentication protocol between RFID cards and card readers are proposed. ...
In the paper, using the RFID cards in MIFARE Classic and DESFire families, a bidirectional covert channel via multipurpose RFID cards between service providers is built to leak sensitive data between two ...
Lightweight and privacy-preserving rfid authentication scheme for distributed iot infrastructure with secure localization services for smart city environment. ...
arXiv:1902.00676v3
fatcat:a4gegguxkffq7c6wxtkag4di6u
A New Ultra-lightweight Authentication Protocol for Low Cost RFID Tags
2013
Sensors & Transducers
At present, the problem of security and privacy become a key factor of severely blocking the widespread of its usage. ...
This paper proposes a new ultra-lightweight RFID authentication protocol with high robustness and execution efficiency. ...
Hence, the protocol proposed in this paper is highly efficient for low-cost RFID tags. nt te er rn na at ti io on na al l O Of ff fi ic ci ia al l J Jo ou ur rn na al l o of f t th he e I In nt te er rn ...
doaj:b24919cd8c6b40679d45696a53b35fe4
fatcat:ubhgzvywebh2hba73vjloyxela
A Methodology for Evaluating Security in Commercial RFID Systems
[chapter]
2017
Radio Frequency Identification
Although RFID has become a widespread technology, the developers of numerous commercial systems have not taken care of security properly. ...
The results obtained show that the consistent application of the methodology allows researchers to perform security audits easily and detect, mitigate, or avoid risks and possible attacks. ...
Acknowledgements This work has been funded by the Spanish Ministry of Economy and Competitiveness under grants TEC2013-47141-C4-1-R and TEC2015-69648-REDC.
Author details Tiago M. ...
doi:10.5772/64844
fatcat:dwcpxjj2kjaajh3pf4ngyxk7ji
A Lightweight Identification Protocol for Embedded Devices
[article]
2014
arXiv
pre-print
The task of this paper is to introduce a new lightweight identification protocol based on biometric data and elliptic curves. ...
Our scheme is light, very fast, secure and robust against all the known attacks on identification protocol. Therefore, one can use it in any constraint device such as embedded systems. ...
Introduction In the era of ubiquitous computing, the need to know the identity and authenticity of the entity with which we communicate and ensure the privacy of users has become essential. ...
arXiv:1408.5945v2
fatcat:vv6yatca2zagbilt4hq2adtjzu
Privacy-preserving multi-factor authentication and role-based access control scheme for the E-healthcare system
2022
Bulletin of Electrical Engineering and Informatics
This paper proposes a privacy-preserving using RBAC and smart multi-factor authentication for the healthcare system to overcome the limitation flaw in previous schemes such as security risk tolerance, ...
The proposed scheme conducted two thorough formal security proofs for the proposed work based on informal analysis and the Scyther tool. ...
SHA 256 is a part of the SHA 2 family of algorithms. ...
doi:10.11591/eei.v11i4.3658
fatcat:5az5f3unznf6hdwy74ttrz5zzi
Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis
2014
IEEE Internet of Things Journal
The privacy issue is also addressed and different ways to hide the device identity are discussed. ...
This paper describes the current protocols and security solutions that can be deployed in constrained resources. ...
ACKNOWLEDGEMENTS This research work was supported by the FP7 European projects BUTLER under contract no. 287901 and SocIoTal under contract no. 609112. ...
doi:10.1109/jiot.2014.2359538
fatcat:nzb5oet5rfbe7kcrgn56cvhvym
Physical Unclonable Functions (PUF) for IoT Devices
[article]
2022
arXiv
pre-print
In this survey we provide a comprehensive review of the state-of-the-art of PUF, its architectures, protocols and security for IoT. ...
PUF is promising solution for lightweight security, where the manufacturing fluctuation process of IC is used to improve the security of IoT as it provides low complexity design and preserves secrecy. ...
Acknowledgments This work is partially funded by the G5797 "Developing Physical-Layer Security Schemes for Internet of Things Networks" project under the NATO's Science for Peace Programme. ...
arXiv:2205.08587v1
fatcat:ytp7ot6pc5asbi46qxsdeewg2u
Secure Data Encryption for Cloud-Based Human Care Services
2018
Journal of Sensors
Finally, the proposed implementations achieved 3.5 cycles/byte and 4.6 cycles/byte for Simeck32/64 and Simeck64/128 encryption, respectively. ...
In order to accelerate the performance, an adaptive encryption technique is also exploited for load balancing of the resulting big data. ...
Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments ...
doi:10.1155/2018/6492592
fatcat:gknjhurljjhaddkmdahgb5ozu4
State of the Art on Mobility and Transport data protection technologies
2021
Zenodo
This document describes the legal provisions and risks associated with the collection of personal mobility and transportation data, along with design strategies and technologies to reduce or eliminate ...
We should note that most of the authors' choices for the value of 𝛿𝛿 in the presented experiments are not aligned with the restrictions set on 𝛿𝛿 by Dwork and Roth 130 , that required 𝛿𝛿 to be ...
The authors propose two different approaches: Sampling First and Interpolation (SFI) and Interpolation First and Sampling (IFS), both achieving (0, 𝛿𝛿)-differential privacy. ...
doi:10.5281/zenodo.6811373
fatcat:qwcyotcs3bds5jswcc6lgbonuq
The practice of online social networking of the physical world
2012
International Journal of Space-Based and Situated Computing (IJSSC)
A big challenge for the web is to become ubiquitous, blended with the everyday life of people. ...
where neighbours compete for energy conservation; and a social application that allows people to compare their electricity footprint with their friends and their community. ...
RFID tags, smart cards, and QR codes). ...
doi:10.1504/ijssc.2012.050007
fatcat:eumw4unynjachmslrhijlxzyv4
VLSI Characterization of the Cryptographic Hash Function BLAKE
2011
IEEE Transactions on Very Large Scale Integration (vlsi) Systems
Cryptographic hash functions are used to protect information integrity and authenticity in a wide range of applications. After the discovery of weaknesses in the current deployed standards, the U.S. ...
In this paper, we investigate highspeed and low-area hardware architectures of one of the 14 "second-round" candidates in this competition: BLAKE. ...
ACKNOWLEDGMENT The authors would like to thank F. Carbognani for his support during the VLSI design and P. Meinerzhagen for his valuable effort in the memory analysis. ...
doi:10.1109/tvlsi.2010.2060373
fatcat:73tbrnvi3rgo7hemjcthkdjymu
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates
[article]
2017
IACR Cryptology ePrint Archive
For accurate evaluation of CAE-SAR candidates, it is of utmost importance to have independent and thorough optimization for each of the ciphers both for their corresponding hardware and software implementations ...
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography because of its ability to provide integrity, confidentiality and authenticity at the same time. ...
Related work and motivation AEAD Ciphers: Authenticated Encryption (AE) is a concept that emerged in the cryptographic community in early 2000s, due to the need for both data privacy and authentication ...
dblp:journals/iacr/KumarHKC17
fatcat:pi34jg2mmjbc3jehzai5vwjrhe
Dismantling DST80-based Immobiliser Systems
2020
Transactions on Cryptographic Hardware and Embedded Systems
However, in many cases the underlying cryptographic primitives used to authenticate a transponder are proprietary in nature and thus not open to public scrutiny. ...
We target the key loading procedure and investigate the practical applicability in the context of portability. ...
Acknowledgments This work was supported in part by the Research Council KU Leuven C1 on Security and Privacy for Cyber-Physical Systems and the Internet of Things with contract number C16/15/058. ...
doi:10.13154/tches.v2020.i2.99-127
dblp:journals/tches/WoutersHGOGP20
fatcat:2amg5kgufndcndatf64m3gadpu
Dismantling DST80-based Immobiliser Systems
2020
Transactions on Cryptographic Hardware and Embedded Systems
However, in many cases the underlying cryptographic primitives used to authenticate a transponder are proprietary in nature and thus not open to public scrutiny. ...
We target the key loading procedure and investigate the practical applicability in the context of portability. ...
Acknowledgments This work was supported in part by the Research Council KU Leuven C1 on Security and Privacy for Cyber-Physical Systems and the Internet of Things with contract number C16/15/058. ...
doi:10.46586/tches.v2020.i2.99-127
fatcat:wncimbgjobagphzu6547urx7gy
FPQA implementation of modified Elliptic Curve Digital Signature Algorithm
2019
Facta universitatis - series Electronics and Energetics
Therefore, this algorithm can be applied for the devices being connected in perceptual layer of the IoT. ...
In this paper, implementation of the original Elliptic Curve Digital Signature Algorithm and its variants are considered and evaluated in terms of the security level and computational cost. ...
If designers considered the privacy implications of unencrypted data, they have limited options for encryption because of this hardware platform. ...
doi:10.2298/fuee1901129v
fatcat:epxt2hymvffmjnai73foun5w2q
« Previous
Showing results 1 — 15 out of 75 results