RFID-MA XTEA: Cost-Effective RFID-Mutual Authentication Design using XTEA Security on FPGA Platform
Abstract
Full Text:
PDFReferences
A. Ibrahim and G. Dalkılıc, “Review of different classes of RFID authentication protocols”, Wireless Networks, Vol.25, No. 3, pp.961-974, 2019, DOI: 10.1007/s11276-017-1638-3
G. Hatzivasilis, K. Fysarakis, I. Papaefstathiou and C. Manifavas. "A review of lightweight block ciphers," Journal of Cryptographic Engineering, Vol. 8, No. 2, pp.141-184, 2018, https://doi.org/10.1007/s13389-017-0160-y
J. Kaur, A. Kumar, M. Bansal. "Lightweight cipher algorithms for smart cards security: A survey and open challenges", 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 541-546, 2017, DOI: 10.1109/ISPCC.2017.8269738
X. Chen, K. Ma, D. Geng, J. Zhai, W. Liu, H. Zhang, T. Zhu, and X. Piao. "Untraceable Analysis of Scalable RFID Security Protocols." Wireless Personal Communications, pp.1-21,2019, DOI: https://doi.org/10.1007/s11277-019-06650-1
M.G. Samaila, M. Neto, D. AB. Fernandes, M. M. Freire, and P. RM. Inácio. "Security challenges of the Internet of Things." Beyond the Internet of Things, pp. 53-82, 2017.
M. M-Kermani, K. Tian, R. Azarderakhsh, and S. B-Sarmadi, "Fault-resilient lightweight cryptographic block ciphers for secure embedded systems", IEEE Embedded Systems Letters, Vol. 6, No. 4, pp.89-92, 2014, DOI: 10.1109/LES.2014.2365099
Y.S. Kang, E.O. Sullivan, D. Choi, and M. O’Neill, "Security Analysis on RFID Mutual Authentication Protocol", In International Workshop on Information Security Applications, Springer, Cham, pp. 65-74, 2015, DOI: https://doi.org/10.1007/978-3-319-31875-2_6
M. Feldhofer and J. Wolkerstorfer, "Hardware implementation of symmetric algorithms for RFID security”, In RFID security, Springer, Boston, MA, pp. 373-415, 2008, DOI: https://doi.org/10.1007/978-0-387-76481-8_15
B. Toiruul and K.O. Lee, “An advanced mutual-authentication algorithm using AES for RFID systems”, International Journal of Computer Science and Network Security, Vol. 6, No. 9B, pp.156-162, 2006
M. Feldhofer, S. Dominikus and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm”, In International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg, pp. 357-370, 2004.
R. Baashirah, A. Kommareddy, S. K. Batchu, V. Sunku, R. S. Ginjupalli, and S. Abuzneid”, Security implementation using present-puffin protocol in RFID devices”, In IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1-5, 2018, DOI: 10.1109/LISAT.2018.8378024
N. Dinarvand and H. Barati, “An efficient and secure RFID authentication protocol using elliptic curve cryptography”, Wireless Networks, Vol. 25, No. 1, pp.415-428, 2019, DOI: https://doi.org/10.1007/s11276-017-1565-3
J. Kang, “Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments”, The Journal of Supercomputing, Vol. 75, No. 8, pp. 4529-4542, 2019, DOI: https://doi.org/10.1007/s11227-016-1788-6
J. Yu, G. Khan, and F. Yuan, “XTEA encryption based novel RFID security protocol”, In 24th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 000058-000062, 2011, DOI: 10.1109/CCECE.2011.6030408
G.N. Khan, X. Yu, and F. Yuan, "A novel XTEA based authentication protocol for RFID systems." In URSI General Assembly and Scientific Symposium, pp. 1-4, 2011, DOI: 10.1109/URSIGASS.2011.6050584
G.N. Khan and G. Zhu, “Secure RFID authentication protocol with key updating technique”, In22nd International Conference on Computer Communication and Networks (ICCCN), pp. 1-5, 2013, DOI: 10.1109/ICCCN.2013.6614192
G. Zhu and G. N. Khan, “Symmetric key based RFID authentication protocol with a secure key-updating scheme”, In 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1-5, 2013, DOI: 10.1109/CCECE.2013.6567741
G.N. Khan and M. Moessner, "Low-cost authentication protocol for passive, computation capable RFID tags”, Wireless Networks, Vol. 21, No. 2, pp. 565-580, 2015, DOI: https://doi.org/10.1007/s11276-014-0803-1
S. Seshabhattar, S. K. Jagannatha, and D. W. Engels, "Security
implementation within GEN2 protocol”, In IEEE International Conference on RFID-Technologies and Applications, pp. 402-407, 2011, DOI: 10.1109/RFID-TA.2011.6068669
M. Saxena, R. N. Shaw, and J.K. Verma. "A Novel Hash-Based Mutual RFID Tag Authentication Protocol", In Data and Communication Networks, pp. 1-12, 2019, DOI: https://doi.org/10.1007/978-981-13-2254-9_1
K. Zang, H. Xu, F. Zhu, and P. Li, “Analysis and Design of Group RFID Tag Security Authentication Protocol", In Conference on Complex, Intelligent, and Software Intensive Systems, Springer, Cham, pp. 637-645, 2019, DOI: https://doi.org/10.1007/978-3-030-22354-0_57
F. Zhu, P. Li, H. Xu, and R. Wang, “A Lightweight RFID Mutual Authentication Protocol with PUF”, Sensor, Vol. 19, No. 13, pp. 2957, 2019, DOI: 10.3390/s19132957.
R. Jain , K. G. Maradiab, "Comparative Analysis of SEA and XTEA for Resource Constrained Embedded Systems," International Journal of Innovative and Emerging Research in Engineering, Vol. 3 No.4, pp. 78-82, 2016
R. Anusha and V.V. D.Shastrimath "LCBC-XTEA: High Throughput Lightweight Cryptographic Block Cipher Model for Low-Cost RFID Systems", In Computer Science On-line Conference, Springer, Cham, pp. 185-196, 2019, DOI: https://doi.org/10.1007/978-3-030-19813-8_20
Refbacks
- There are currently no refbacks.
International Journal of Electronics and Telecommunications
is a periodical of Electronics and Telecommunications Committee
of Polish Academy of Sciences
eISSN: 2300-1933