Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








249 Hits in 6.0 sec

Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher [chapter]

Olivier Billet, Jonathan Etrog, Henri Gilbert
2010 Lecture Notes in Computer Science  
In this paper, a privacy preserving authentication protocol for RFID that relies on a single cryptographic component, a lightweight stream cipher, is constructed.  ...  We achieve this goal by solely relying on a stream cipher-which can be arbitrarily chosen, for instance a stream cipher design aimed at extremely lightweight hardware implementations-and we provide security  ...  We show how to convert any lightweight stream cipher such as Grain or Trivium into a simple and highly efficient privacy preserving mutual authentication protocol.  ... 
doi:10.1007/978-3-642-13858-4_4 fatcat:f3zc2sh2tvegfkh4vkrdyfxvua

Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

Manju Lata, Adarsh Kumar
2014 International Journal of Communication Networks and Information Security  
This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems.  ...  There is a strong need to employ lightweight cryptographic primitives for many security applications because of the tight cost and constrained resource requirement of sensor based networks.  ...  It is a symmetric-key privacy-preserving authentication protocol along with constant-time identification.  ... 
dblp:journals/ijcnis/LataK14 fatcat:3dpqpm7lnzcbrlhb6uj2nbi7j4

Securing Low-cost RFID Systems: A Research Survey

Qi Chai
2014 International Journal of RFID Security and Cryptography  
To be specific, previous attempts to enable or increase the security and privacy of the low-cost RFID systems are examined, including: (1) design and cryptanalysis of lightweight ciphers; (2) privacy-preserving  ...  and privacy purposes. • Design of new cryptographic primitives/protocols, e.g., stream/block ciphers, hash functions, authentication methods, by: (1) optimizing implementations of standardized and trusted  ...  In FSE'10, Billet et al. in [13] proposed a privacy-preserving mutual authentication protocol based upon a stream cipher and proved that this protocol achieves security, efficiency and a strong privacy  ... 
doi:10.20533/ijrfidsc.2046.3715.2014.0015 fatcat:skq7whrbwffhjf22v6ub672al4

Secure Medical Internet of Things Framework based on Parkerian Hexad Model

Nidal Turab, Qasem Kharma
2019 International Journal of Advanced Computer Science and Applications  
Medical Internet of Things (MIoT) applications enhance medical services by collecting data using devices connected to the IoT.  ...  Unfortunately, connecting a device to a network or sending data via wide network may make those devices and data vulnerable to unauthorized access.  ...  Hummingbird-2 is a good choice for passive RFID systems [56] . 2) Phelix: An authenticated encryption that combines stream cipher and MAC function.  ... 
doi:10.14569/ijacsa.2019.0100608 fatcat:pobahgxmxjepxm6y45qi6lydlq

A Study of Security Vulnerabilities in Mobile environment

Suk-jin Kim, Hyangran Lee, Malrey Lee
2015 The International Journal of Advanced Culture Technology  
Now day's application had focus more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that become important for security.  ...  RFID devices are going to be ubiquitous applications that are used in different areas especially in the business because it simplifies many business transactions.  ...  ACKNOWLEDGEMENTS This work (Grants No: 1401001175) was supported by Business for Academic-industrial Cooperative establishments funded Korea Small and Medium Business Administration in 2015.  ... 
doi:10.17703/ijact.2015.3.2.149 fatcat:dbf3vgagajf7va4pdxxbkqy4le

Security Vulnerabilities in RFID Networks

Junaid Ahsenali Chaudhry, Malrey Lee
2013 International journal of advanced smart convergence  
RFID devices are going to be ubiquitous applications that are used in different areas especially in the business because it simplifies many business transactions.  ...  Nowaday's application, that is focused more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that became important for security.  ...  ] , KTANTAN [38] , TEA [39] , and Hummingbird [40] , as well as lightweight stream ciphers Grain [41] and Trivium [13] .  ... 
doi:10.7236/ijasc2013.2.2.7 fatcat:lsynrr4srvcttpdredyqjkh57i

Energy Efficient Light Weight Security Algorithm for Low Power IOT Devices

2019 International Journal of Engineering and Advanced Technology  
With proliferating applications and innovations, there is a stringent need to preserve user privacy and anonymize interactions using a lightweight cryptographic algorithm.  ...  Subsequently, Augmented Security and Optimized memory space is achieved for the data channelized via IoT by using the combination of the Light weight masked AES (Advanced Encryption Standard) and MD5 (  ...  With proliferating applications and innovations, there is a stringent need to preserve user privacy and anonymize interactions using a lightweight cryptographic algorithm.  ... 
doi:10.35940/ijeat.a1010.1291s319 fatcat:xyv7szr3yjbp7kndz5llsioqbq

Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

Shugo Mikami, Dai Watanabe, Yang Li, Kazuo Sakiyama
2015 The Scientific World Journal  
While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use.  ...  In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function.  ...  Previous Works To overcome security and privacy issues, privacy-preserving RFID authentication protocols based on cryptographic algorithms have been developed [11] .  ... 
doi:10.1155/2015/498610 pmid:26491714 pmcid:PMC4603319 fatcat:d45aqowpbvcxfljtgfgv7lkwu4

A Survey on Stream Ciphers for Constrained Environments

Alaa Kadhim Farhan
2021 Zenodo  
In this paper, we will make a survey on a solution that used stream cipher in cryptography.  ...  Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and block ciphers.  ...  ACORN stream cipher is proposed for lightweight authenticated encryption.  ... 
doi:10.5281/zenodo.5732804 fatcat:5izov35nwzbrzp6nkjgftvqzpy

Lightweight Cryptographic for Securing Constrained Resource IoT Devices

2020 International journal of recent technology and engineering  
For that, lightweight cryptographic primitives (LWC) have been introduced.  ...  The idea is to connect a variety of objects or things (e.g., RFID tags, NFC tags, sensors, etc.), which can interact and exchange data with each other anywhere and everywhere over the internet.  ...  The encryption process under stream ciphers uses one bit or byte at a time than a whole block under a block cipher, which considers stream ciphers faster and more convenient concerning real-time data,  ... 
doi:10.35940/ijitee.d9060.029420 fatcat:fne4gzufcnfslpsua4jw2ifpzm

Recent Security Trends in Internet of Things: a Comprehensive Survey

Yasmine Harbi, Zibouda Aliouat, Allaoua Refoufi, Saad Harous
2021 IEEE Access  
It is also more efficient than Block Cipher based on Chaotic (BCC) algorithm. Noura et al. [84] proposed a lightweight stream cipher method for real-time IoT applications.  ...  In block ciphers, a block of plaintext is encrypted at a time, while stream ciphers encrypt/decrypt a single bit or byte of plaintext/ciphertext.  ... 
doi:10.1109/access.2021.3103725 fatcat:elfjfrhtnjfvhjp5jqtkj7r7gy

Contingent Consideration of Lightweight Algorithms for IoT

Pradeep S, Saideepthi Pabba, Sudhakar K
2020 International Journal of Engineering and Technology  
This paper provides an analysis on existing lightweight cryptographic algorithm which are used for providing security in IoT  ...  As a result of this, it is at most important to analyze the existing cryptographic ciphers on such devices and decide, if they are feasible for expression implementation process and memory utilization  ...  Blocks transformation ,Symmetric cipher or fixed sized values are 3 kinds uses of lightweight cryptographic calculation .lightweight cipher uses a keyed pseudo-random permutation for more complex architecture  ... 
doi:10.21817/ijet/2020/v12i3/201203022 fatcat:wjdtlbbwdzedtg6jg6ds5ja3m4

RFID Product Authentication in EPCglobal Network [chapter]

Tieyan Li, Wei He
2009 Development and Implementation of RFID Technology  
Recently, RFID was reportedly used in product authentication solutions to achieve a higher degree of automation when checking the authenticity of a product.  ...  With wide adoption of RFID technology witnessed in various industries, the future of RFID for product authentication purpose looks optimistic.  ...  Comparable lightweight stream ciphers, like Grain, has about 1, 300 Gate Equivalents [16] .  ... 
doi:10.5772/6533 fatcat:iigq3vsyvjgc5flxrsdwugie4q

SLIM: A Lightweight Block Cipher for Internet of Health Things

Ankit Ruhil, Dr. Manjot Kaur Bhatia, Pooja kumari
2022 International Journal for Research in Applied Science and Engineering Technology  
The most difficult aspect of creating a lightweight block cipher is balancing performance, cost, and security. SLIM, like all symmetric block ciphers, encrypts and decrypts using the same key.  ...  Since block ciphers are the most commonly used cryptographic and provide highly strong protection for IoT devices, SLIM is a 32-bit block cipher based on the Feistel structure.  ...  The Enocoro and Trivium algorithms, on the other hand, are the most used lightweight stream ciphers. III.  ... 
doi:10.22214/ijraset.2022.47879 fatcat:shu5ms7qc5clrbkzpejzws5ff4

Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey [article]

Muhammad Rana, Quazi Mamun, Rafiqul Islam
2020 arXiv   pre-print
Cryptography is being used to secure the networks for authentication, confidentiality, data integrity and access control.  ...  Additionally, we consider several recent developed block cipher and stream cipher algorithms. Furthermore, various research challenges of lightweight cryptography have been addressed.  ...  Stream ciphers are used for both speed and fewer computation requirements. Some common stream ciphers are RC4, Salsa20, Trivium and Chacha.  ... 
arXiv:2010.00852v1 fatcat:mzz2bxhwcvdhbl3nlf5zbvrcgy
« Previous Showing results 1 — 15 out of 249 results