Proceedings of 2012 UKACC International Conference on Control 2012
DOI: 10.1109/control.2012.6334768
|View full text |Cite
|
Sign up to set email alerts
|

A RFID mutual authentication protocol based on AES algorithm

Abstract: Abstract-The emergence of RFID applications has huge influence to become pervasive in modern life. However the vulnerability of the transmission through the air and the unique identification number of RFID tag are the drawbacks that impact the popularity of RFID technology. In this paper, a mutual authentication protocol is proposed based on the challengeresponse model. The Advanced Encryption Standard (AES) is used as a cryptographic primitive to secure the data. The experimental works are carried out to vali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Here, the number of internal state bits is 3n 2 for Bivium and 3n 3 for Trivium and Micro-Trivium. g a , g b , g c must be large enough to derive enough linear equations, and the number of internal state bits should be as large as possible through (10). However, hardware restrictions limit the size of this number.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, the number of internal state bits is 3n 2 for Bivium and 3n 3 for Trivium and Micro-Trivium. g a , g b , g c must be large enough to derive enough linear equations, and the number of internal state bits should be as large as possible through (10). However, hardware restrictions limit the size of this number.…”
Section: Discussionmentioning
confidence: 99%
“…7 Trivium is designed as a lightweight algorithm that requires much less resource consumption than traditional cryptography techniques, such as AES (Advanced Encryption Standard), ECC (Elliptic Curve Cryptography), and hash-based algorithms. [8][9][10][11] However, it remains too costly for low-cost RFID tags in distributed sensor networks due to their extreme resource limitations. 3 Therefore, we attempt to design a more lightweight Trivium-like algorithm to fit the environment of distributed sensor networks.…”
Section: Introductionmentioning
confidence: 99%
“…Among the alternative solutions used to protect RFID protocols is the Symmetric Advanced Encryption Standard (AES) cryptosystems [35]. Because of their key sizes, these cryptosystems meet the resource constraints of RFID tags.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, the security and privacy of the system is increasingly concerned because a reader can scan and obtain the data from any tags if they are accessed without any authorization. Some encryption schemes were developed based on classic cipher algorithms such as Advanced Encryption Standard (AES) or Elliptic Curve Cryptography (ECC) [2][3][4]; Others utilised the hash-based algorithm, pseudo random number generator, and Cyclic Redundancy Check (CRC) function with some XOR and rotation operations [5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%