Open Access System for Information Sharing

Login Library

 

Thesis
Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorSeungkwang Leeen_US
dc.date.accessioned2014-12-01T11:47:07Z-
dc.date.available2014-12-01T11:47:07Z-
dc.date.issued2011en_US
dc.identifier.otherOAK-2014-00508en_US
dc.identifier.urihttp://postech.dcollection.net/jsp/common/DcLoOrgPer.jsp?sItemId=000000897292en_US
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/1010-
dc.descriptionMasteren_US
dc.description.abstractCounterfeiting is emerging as a serious threat to low-cost Radio Frequency Identification (RFID) tags. In addition, these RFID tags have engendered controversies on privacydue to their capability to provide unique identification. To solve theses problems, sophisticated tags can engage in authentication protocols using standard cryptographic algorithms. However, low-cost tags lack resources to implement these standard algorithms. So far, many studies have focused on implementing secure authentication protocols for low-cost tags.The protocols for low-cost tags can be classified into two classes: lightweight and ultralightweight. The lightweight protocols require a random number generator and simple functions such as Cyclic Redundancy Checksum code but not a hash function while the ultralightweight protocols involve only bitwise operations on the tag-side. In the lightweight protocol class, HB+ is computationally efficient but is vulnerable to a simple man-in-the-middle (MITM) attack, called the GRS attack.Later, HB# improves HB+ over the GRS attack. While HB+ is a multi-round protocol, where each round consists of three passes, HB# is a single-round protocol consisting of three passes, and thus reduces communication costs between the tag and the reader. But HB# requires relatively large size of memory in hundreds of thousands bits for two shared secret matrices. More importantly, this protocol is also known to be vulnerable to a new type of MITM attack, called the OOV attack.In the ultralightweight protocol class, the Gossamer protocol, the most recently published protocol, involves too heavyweight operations including modular additions and modulo operations with modulus 96.In this thesis, we propose HB-SK, which is an improved version of HB+. HB-SK is shown to be resistant to the GRS attack and also more lightweight than HB+. Next, we propose HB#-SK, which is an improved version of HB#. HB#-SK is shown to be resistant to the OOV attack. Finally, we also propose an ultralightweight RFID authentication protocol, called UFO. UFO is shown to be more lightweight than the conventional Gossamer protocol.en_US
dc.languageengen_US
dc.publisher포항공과대학교en_US
dc.rightsBY_NC_NDen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.0/kren_US
dc.titleLightweight and Ultralightweight RFID Authentication Protocols for Low-cost Tagsen_US
dc.title.alternative저가형 태그를 위한 경량 및 초경량 RFID 인증 프로토콜en_US
dc.typeThesisen_US
dc.contributor.college일반대학원 컴퓨터공학과en_US
dc.date.degree2011- 2en_US
dc.type.docTypeThesis-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Views & Downloads

Browse