A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
[chapter]
2010
Lecture Notes in Computer Science
In this paper, a privacy preserving authentication protocol for RFID that relies on a single cryptographic component, a lightweight stream cipher, is constructed. ...
We achieve this goal by solely relying on a stream cipher-which can be arbitrarily chosen, for instance a stream cipher design aimed at extremely lightweight hardware implementations-and we provide security ...
We show how to convert any lightweight stream cipher such as Grain or Trivium into a simple and highly efficient privacy preserving mutual authentication protocol. ...
doi:10.1007/978-3-642-13858-4_4
fatcat:f3zc2sh2tvegfkh4vkrdyfxvua
Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks
2014
International Journal of Communication Networks and Information Security
This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems. ...
There is a strong need to employ lightweight cryptographic primitives for many security applications because of the tight cost and constrained resource requirement of sensor based networks. ...
It is a symmetric-key privacy-preserving authentication protocol along with constant-time identification. ...
dblp:journals/ijcnis/LataK14
fatcat:3dpqpm7lnzcbrlhb6uj2nbi7j4
Securing Low-cost RFID Systems: A Research Survey
2014
International Journal of RFID Security and Cryptography
To be specific, previous attempts to enable or increase the security and privacy of the low-cost RFID systems are examined, including: (1) design and cryptanalysis of lightweight ciphers; (2) privacy-preserving ...
and privacy purposes. • Design of new cryptographic primitives/protocols, e.g., stream/block ciphers, hash functions, authentication methods, by: (1) optimizing implementations of standardized and trusted ...
In FSE'10, Billet et al. in [13] proposed a privacy-preserving mutual authentication protocol based upon a stream cipher and proved that this protocol achieves security, efficiency and a strong privacy ...
doi:10.20533/ijrfidsc.2046.3715.2014.0015
fatcat:skq7whrbwffhjf22v6ub672al4
Secure Medical Internet of Things Framework based on Parkerian Hexad Model
2019
International Journal of Advanced Computer Science and Applications
Medical Internet of Things (MIoT) applications enhance medical services by collecting data using devices connected to the IoT. ...
Unfortunately, connecting a device to a network or sending data via wide network may make those devices and data vulnerable to unauthorized access. ...
Hummingbird-2 is a good choice for passive RFID systems [56] . 2) Phelix: An authenticated encryption that combines stream cipher and MAC function. ...
doi:10.14569/ijacsa.2019.0100608
fatcat:pobahgxmxjepxm6y45qi6lydlq
A Study of Security Vulnerabilities in Mobile environment
2015
The International Journal of Advanced Culture Technology
Now day's application had focus more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that become important for security. ...
RFID devices are going to be ubiquitous applications that are used in different areas especially in the business because it simplifies many business transactions. ...
ACKNOWLEDGEMENTS This work (Grants No: 1401001175) was supported by Business for Academic-industrial Cooperative establishments funded Korea Small and Medium Business Administration in 2015. ...
doi:10.17703/ijact.2015.3.2.149
fatcat:dbf3vgagajf7va4pdxxbkqy4le
Security Vulnerabilities in RFID Networks
2013
International journal of advanced smart convergence
RFID devices are going to be ubiquitous applications that are used in different areas especially in the business because it simplifies many business transactions. ...
Nowaday's application, that is focused more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that became important for security. ...
] , KTANTAN [38] , TEA [39] , and Hummingbird [40] , as well as lightweight stream ciphers Grain [41] and Trivium [13] . ...
doi:10.7236/ijasc2013.2.2.7
fatcat:lsynrr4srvcttpdredyqjkh57i
Energy Efficient Light Weight Security Algorithm for Low Power IOT Devices
2019
International Journal of Engineering and Advanced Technology
With proliferating applications and innovations, there is a stringent need to preserve user privacy and anonymize interactions using a lightweight cryptographic algorithm. ...
Subsequently, Augmented Security and Optimized memory space is achieved for the data channelized via IoT by using the combination of the Light weight masked AES (Advanced Encryption Standard) and MD5 ( ...
With proliferating applications and innovations, there is a stringent need to preserve user privacy and anonymize interactions using a lightweight cryptographic algorithm. ...
doi:10.35940/ijeat.a1010.1291s319
fatcat:xyv7szr3yjbp7kndz5llsioqbq
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol
2015
The Scientific World Journal
While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. ...
In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. ...
Previous Works To overcome security and privacy issues, privacy-preserving RFID authentication protocols based on cryptographic algorithms have been developed [11] . ...
doi:10.1155/2015/498610
pmid:26491714
pmcid:PMC4603319
fatcat:d45aqowpbvcxfljtgfgv7lkwu4
A Survey on Stream Ciphers for Constrained Environments
2021
Zenodo
In this paper, we will make a survey on a solution that used stream cipher in cryptography. ...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and block ciphers. ...
ACORN stream cipher is proposed for lightweight authenticated encryption. ...
doi:10.5281/zenodo.5732804
fatcat:5izov35nwzbrzp6nkjgftvqzpy
Lightweight Cryptographic for Securing Constrained Resource IoT Devices
2020
International journal of recent technology and engineering
For that, lightweight cryptographic primitives (LWC) have been introduced. ...
The idea is to connect a variety of objects or things (e.g., RFID tags, NFC tags, sensors, etc.), which can interact and exchange data with each other anywhere and everywhere over the internet. ...
The encryption process under stream ciphers uses one bit or byte at a time than a whole block under a block cipher, which considers stream ciphers faster and more convenient concerning real-time data, ...
doi:10.35940/ijitee.d9060.029420
fatcat:fne4gzufcnfslpsua4jw2ifpzm
Recent Security Trends in Internet of Things: a Comprehensive Survey
2021
IEEE Access
It is also more efficient than Block Cipher based on Chaotic (BCC) algorithm. Noura et al. [84] proposed a lightweight stream cipher method for real-time IoT applications. ...
In block ciphers, a block of plaintext is encrypted at a time, while stream ciphers encrypt/decrypt a single bit or byte of plaintext/ciphertext. ...
doi:10.1109/access.2021.3103725
fatcat:elfjfrhtnjfvhjp5jqtkj7r7gy
Contingent Consideration of Lightweight Algorithms for IoT
2020
International Journal of Engineering and Technology
This paper provides an analysis on existing lightweight cryptographic algorithm which are used for providing security in IoT ...
As a result of this, it is at most important to analyze the existing cryptographic ciphers on such devices and decide, if they are feasible for expression implementation process and memory utilization ...
Blocks transformation ,Symmetric cipher or fixed sized values are 3 kinds uses of lightweight cryptographic calculation .lightweight cipher uses a keyed pseudo-random permutation for more complex architecture ...
doi:10.21817/ijet/2020/v12i3/201203022
fatcat:wjdtlbbwdzedtg6jg6ds5ja3m4
RFID Product Authentication in EPCglobal Network
[chapter]
2009
Development and Implementation of RFID Technology
Recently, RFID was reportedly used in product authentication solutions to achieve a higher degree of automation when checking the authenticity of a product. ...
With wide adoption of RFID technology witnessed in various industries, the future of RFID for product authentication purpose looks optimistic. ...
Comparable lightweight stream ciphers, like Grain, has about 1, 300 Gate Equivalents [16] . ...
doi:10.5772/6533
fatcat:iigq3vsyvjgc5flxrsdwugie4q
SLIM: A Lightweight Block Cipher for Internet of Health Things
2022
International Journal for Research in Applied Science and Engineering Technology
The most difficult aspect of creating a lightweight block cipher is balancing performance, cost, and security. SLIM, like all symmetric block ciphers, encrypts and decrypts using the same key. ...
Since block ciphers are the most commonly used cryptographic and provide highly strong protection for IoT devices, SLIM is a 32-bit block cipher based on the Feistel structure. ...
The Enocoro and Trivium algorithms, on the other hand, are the most used lightweight stream ciphers. III. ...
doi:10.22214/ijraset.2022.47879
fatcat:shu5ms7qc5clrbkzpejzws5ff4
Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey
[article]
2020
arXiv
pre-print
Cryptography is being used to secure the networks for authentication, confidentiality, data integrity and access control. ...
Additionally, we consider several recent developed block cipher and stream cipher algorithms. Furthermore, various research challenges of lightweight cryptography have been addressed. ...
Stream ciphers are used for both speed and fewer computation requirements. Some common stream ciphers are RC4, Salsa20, Trivium and Chacha. ...
arXiv:2010.00852v1
fatcat:mzz2bxhwcvdhbl3nlf5zbvrcgy
« Previous
Showing results 1 — 15 out of 249 results