A light-weight authentication protocol using integer arithmetic for low-cost RFID tags

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 1610
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Kwnag-Jo-
dc.contributor.advisor김광조-
dc.contributor.authorKwak, Min-Hae-
dc.contributor.author곽민혜-
dc.date.accessioned2011-12-28T03:03:58Z-
dc.date.available2011-12-28T03:03:58Z-
dc.date.issued2009-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=393074&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/55053-
dc.description학위논문(석사) - 한국정보통신대학교 : 공학부, 2009.2, [ vii, 44 p. ]-
dc.description.abstractThe cost of the tag is one of the important factors to their proliferation. Designing a secure and efficient light-weight authentication protocol is imperative for resisting against all feasible attacks. In general, the low-cost tag is difficult to implement the traditional public key cryptosystem since the tag``s limited storage capacity(25-3K storage and 5-10K logic gates). Over the past years, several streams of research have emerged to resolve the RFID authentication security problem from different perspectives. Most of the previous light-weight RFID authentication protocols based on random number generator, Cyclic Redundancy Code(CRC) or bitwise operations (e.g., XOR, AND and OR)are vulnerable to both passive and active attacks [32, 31]. For instance, anyone can obtain the tag identity and secret key through the consecutive eavesdropping.[12] In this paper, we propose a light-weight and secure authentication protocol that enhances Stephane $\It{et al}$.``s [24] protocol based on a random number generator and abstract of integer arithmetic (AIA), which generates secret key pool from the subset of the remainders and the carries of the integer multiplication. We assume that the tag and the reader share the same secret $\It{K}$,$\It{AIA}$. Two parties then perform specific integer arithmetic to make message using their own $K_i$ and $AIA_i$. Then, both parties convince that they share same secret key from exchanging their messages. We consider two different situation as the state of the authentication session, authentication terminates normally or not. Then, if the desynchronization between the tag and the reader occurs, the tag recovers the key, it was before. Every tag is designed with a unique set of logic gates to perform the message computation so that our protocol strong to cloning attack as well as man-in-the-middle attack. Furthermore, Security properties such as man-in-the-middle attack, forgery attack, replay attack and de-synchronization, appe...eng
dc.languageeng-
dc.publisher한국정보통신대학교-
dc.subject저가태그-
dc.subject정수연산-
dc.subject경량인증기법-
dc.subject전자태그-
dc.subjectAIA-
dc.subjectInteger Arithmetic-
dc.subjectLight-weight protocol-
dc.subjectRFID-
dc.subjectLow-cost tag-
dc.titleA light-weight authentication protocol using integer arithmetic for low-cost RFID tags-
dc.typeThesis(Master)-
dc.identifier.CNRN393074/225023-
dc.description.department한국정보통신대학교 : 공학부, -
dc.identifier.uid020074236-
dc.contributor.localauthorKim, Kwnag-Jo-
dc.contributor.localauthor김광조-
Appears in Collection
School of Engineering-Theses_Master(공학부 석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0