Cryptographic Protocols for Component Identification and Applications
نویسنده
چکیده
The main contribution of this work is to provide solutions for component identification in composite technical systems such as automobiles or airplanes. We focused on the following three goals: (1) piracy protection to identify original parts and detect bogus parts; (2) system protection to monitor a system in order to ensure system integrity; and (3) theft protection to prevent the usage of stolen components. There are applications in a variety of fields, such as automobile, aviation and telecommunication industry. For example, our work is able to ensure that cell phones only work with original batteries, or that air planes do not start when bogus parts are built in. Our solutions help to gain profit for manufacturers and ensure quality of products and services for consumers. We attempted to treat the problem of component identification comprehensively in this thesis. We hope that the thesis can serve as a reference to implement cryptographic protocols to achieve one or more of the above mentioned goals for all kinds of applications. After a motivation for component ID systems we develop a variety of solutions to meet the requirements of different systems. We consider protocols using different encryption schemes, such as symmetric and asymmetric encryption, as well as suited protocols for different kinds of network architecture, e.g., server-client and peer-to-peer networks. Furthermore, we introduce parameters to customize the solutions for individual needs.
منابع مشابه
Securing Deployed RFIDs by Randomizing the Modulation and the Channel
RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate reader can break their cryptographic protocol and obtain their secret keys. One solution for this problem is to install stronger cryptographic protocols on the cards. However, ...
متن کاملUsing Elliptic Curves on RFID Tags
We present a concept for the realization of asymmetric cryptographic techniques in light-weight cryptographic devices and describe an implementation based on elliptic curve cryptography which can be used for authentication in mass applications of RFID tags. Our schemes offer advantages in large decentralized applications with many unobservable readers in the field over previous solutions. Moreo...
متن کاملSurvey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or mobile ad hoc networks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight cryptographic primitives for many security applications beca...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملCryptographic Protocols, Sensor Network Key Management, and RFID Authentication
This thesis includes my research on efficient cryptographic protocols, sensor network key management, and radio frequency identification (RFID) authentication protocols. Key exchange, identification, and public key encryption are among the fundamental protocols studied in cryptography. There are two important requirements for these protocols: efficiency and security. Efficiency is evaluated usi...
متن کامل