885 research outputs found

    Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

    Full text link
    Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low cost RFID tags, a number of challenges arise due to the extremely limited computational, storage and communication abilities of Low-cost RFID tags. This paper proposes a real mutual authentication protocol for low cost RFID tags. The proposed protocol prevents passive attacks as active attacks are discounted when designing a protocol to meet the requirements of low cost RFID tags. However the implementation of the protocol meets the limited abilities of low cost RFID tags.Comment: 11 Pages, IJNS

    Ultra-Lightweight Mutual Authentication Protocol with Substitution Operation

    Get PDF
    A method comprises using at least one of a reader and a passive tag to exchange values according to an ultra-lightweight mutual authentication protocol with a substitution operation to change a Hamming weight of the values

    Low-Cost information transfer system between vehicles on roads

    Get PDF
    The authentication process is a key component to increase security in a vehicle network. Most of the authentication protocols proposed in the literature are based on asymmetric cryptography, and specifically on the use of the RSA algorithm. In addition, the use of digital certificates and a public key infrastructure is considered. Therefore, the authentication process is often complex. In order to propose a secure solution, without the use of digital certificates and the RSA algorithm, a mutual authentication protocol based on the Diffie-Hellman algorithm is presented to establish a session key between vehicle (OBU) and road unit (RSU). From the session key, a secure communication channel can be established to transmit the identifier of each participant and the respective security parameters. To perform the authentication process, the entities perform low-cost computational operations such as hash and XOR functions. Once the mutual authentication protocol is completed, the vehicle and the road unit can exchange messages securely

    Cryptanalysis of two mutual authentication protocols for low-cost RFID

    Full text link
    Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their security flaws. In this paper, we analyze two of the newest RFID authentication protocols which proposed by Fu et al. and Li et al. from several security viewpoints. We present different attacks such as desynchronization attack and privacy analysis over these protocols.Comment: 17 pages, 2 figures, 1 table, International Journal of Distributed and Parallel system

    Design and Implementation of a Secure Communication Protocol

    Get PDF
    The main object of this paper is to present a mutual authentication protocol that guarantees security, integrity and authenticity of messages, transferred over a network system. In this paper a symmetric key cryptosystem, that satisfies all the above requirements, is developed using theorems of J.R. Chen, I.M. Vinogradov and Fermat and the decimal expansion of an irrational number

    A Secure Mutual Authentication Protocol for Low-Cost RFID System

    Get PDF
    • …
    corecore