RSPAE: RFID Search Protocol based on Authenticated Encryption

Authors

  • Mehdi Hosseinzadeh Health Management and Economics Research Center, Iran University of Medical Sciences, Tehran, Iran
  • Nasour Bagheri N. Bagheri Electrical Engineering Department, Shahid Rajaee Teacher Training University, Tehran, Iran Postal code: 16788-15811, Tel/fax:+98-21-2297006
Abstract:

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the security level, which can provide confidentiality and integrity, simultaneously. Furthermore, since the proposed protocol belongs to the lightweight protocols category, it is appropriate for applications that require many tags and costs must be low. In terms of the security, the analysis results give a satisfactory security level and it is robust against different RFID threats like replay, traceability and impersonation attacks. Using Ouafi-Phan model, BAN and AVISPA, we also checked the security correctness of the suggested protocol.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Permutation-based encryption, authentication and authenticated encryption

While mainstream symmetric cryptography has been dominated by block ciphers, we have proposed an alternative based on fixed-width permutations with modes built on top of the sponge and duplex construction, and our concrete proposal K . Our permutationbased approach is scalable and suitable for high-end CPUs as well as resource-constrained platforms. The la er is illustrated by the small K insta...

full text

Authenticated On-Line Encryption

In this paper, we investigate the authenticated encryption paradigm, and its security against blockwise adaptive adversaries, mounting chosen ciphertext attacks on on-the-fly cryptographic devices. We remark that most of the existing solutions are insecure in this context, since they provide a decryption oracle for any ciphertext. We then propose a generic construction called Decrypt-Then-Mask,...

full text

A Lightweight Authenticated Encryption Algorithm for RFID Systems

Security of RFID systems is a very important issue with the increasing of their applications. To achieve secure communications between a reader and a tag in RFID systems, encryption of the communication data is usually performed. However, in case of low-cost RFID tags, it is difficult for them to adopt the well-known encryption algorithms because the tags have very limited resources to implemen...

full text

Authenticated Streamwise On-line Encryption

In Blockwise On-line Encryption, encryption and decryption return an output block as soon as the next input block is received. In this paper, we introduce Authenticated Streamwise Online Encryption (ASOE), which operates on plaintexts and ciphertexts as streams of arbitrary length (as opposed to fixed-sized blocks), and thus significantly reduces message expansion and end-to-end latency. Also, ...

full text

Authenticated Encryption

Often when two parties communicate over a network, they have two main security goals: privacy and authentication. In fact, there is compelling evidence that one should never use encryption without also providing authentication [8, 14]. Many solutions for the privacy and authentication problems have existed for decades, and the traditional approach to solving both simultaneously has been to comb...

full text

Ring Authenticated Encryption: A New Type of Authenticated Encryption

By combining the two notations of ring signature and authenticated encryption together, we introduce a new type of authenticated encryption signature, called ring authenticated encryption, which has the following properties: signer-ambiguity, signer-verifiability, recipient-designation, semantic-security, verification-convertibility, verification-dependence and recipient-ambiguity. We also give...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 6  issue 2

pages  179- 192

publication date 2018-11-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023