Increasing key space at little extra cost in RFID authentications

نویسندگان

  • Gökhan DALKILIÇ
  • Mehmet Hilal ÖZCANHAN
  • Hafize Şen
چکیده

Traditional authentication and key establishment protocols utilize nonce parameters as a means for message freshness, recent aliveness, and key derivation. Improving identity verification, increasing key space, or making secret updates more complex through nonces are not goals. Generating random numbers as nonces and not making the most out of them can be considered as a loss in resource stricken radio frequency identification (RFID) tags. By increasing the shared secrets slightly, a new functionality for the nonces is introduced, which makes the authentication and key establishment protocols of RFID systems more secure, in general. The proposed method contributes to the security of communication channels by increasing the key space. Attaining better security, with just a slight increase in the shared secrets and the already generated nonces, is beneficial compared to the existing costly, resource-demanding security primitives.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying the Factors of Cost Issues in Development of Radio Frequency Identification Technology in Supply Chain Management

RFID has lots of potential benefits for supply chain management; that`s why it has attracted many industry practitioners all around the world, especially in recent years. RFID is one of the key solutions that information technology has provided for industry. The main issue in implementing and also developing this unique technology in the supply chain management of every industry appears to be t...

متن کامل

KEY DIMENSIONS OF EFFECTIVE FACTORS IN RFID TECHNOLOGY DEVELOPMENT IN THE SUPPLY CHAIN OF IRAN’S AUTO-INDUSTRY

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...

متن کامل

KEY DIMENSIONS OF EFFECTIVE FACTORS IN RFID TECHNOLOGY DEVELOPMENT IN THE SUPPLY CHAIN OF IRAN’S AUTO-INDUSTRY

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...

متن کامل

An efficient RFID mutual authentication scheme based on ECC

Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy pro...

متن کامل

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs

RFID-based tokens are increasingly used in electronic payment and ticketing systems for mutual authentication of tickets and terminals. These systems typically use cost-effective tokens without expensive hardware protection mechanisms and are exposed to hardware attacks that copy and maliciously modify tokens. Physically Unclonable Functions (PUFs) are a promising technology to protect against ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013