5 research outputs found

    On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols

    Get PDF
    Mutual authentication is essential to guarantee the confidentiality, integrity, and availability of an RFID system. One area of interest is the design of lightweight mutual authentication protocols that meet the limited computational and energy resources of the tags. These protocols use simple operations such as permutation and cyclic redundancy code for cryptographic purposes. However, these functions are cryptographically weak and are easily broken. In this work, we present a case against the use of these functions for cryptographic purposes, due to their simplicity and linear properties, by analyzing the LPCP protocol. We evaluate the claims of the LPCP resistance to de-synchronization and full disclosure attacks and show that the protocol is weak and can be easily broken by eavesdropping on a few mutual authentication sessions. This  weakness stems from the functions themselves as well as the improper use of inputs to these functions. We further offer suggestions that would help in designing more secure protocols

    Ultra-Lightweight Mutual Authentication Protocol with Substitution Operation

    Get PDF
    A method comprises using at least one of a reader and a passive tag to exchange values according to an ultra-lightweight mutual authentication protocol with a substitution operation to change a Hamming weight of the values

    Survivability and Reliability Analysis of the Trusted Link State Routing Protocol for Wireless AD HOC Networks

    No full text
    The nodes in a wireless network are responsible for both sending their traffic as well as relaying the traffic of other nodes in the network. This form of collaboration between the nodes is essential for the proper delivery of data. Without fair participation of all nodes in the routing process, some nodes may lose their energy reserves at a high rate compared to other nodes in the network. However, bandwidth and energy are not the only issues in wireless networks; survivability and reliability are critical as well. Our focus in this work is on two link state routing protocols; OLSR and TLR. We study the effect of using these protocols on the survivability and the reliability of wireless networks. Both analytical and simulation work show that TLR results in better performance due to the inherent energy aware approach and the traffic partition used to reduce congestions in the network
    corecore