2012 21st International Conference on Computer Communications and Networks (ICCCN) 2012
DOI: 10.1109/icccn.2012.6289242
|View full text |Cite
|
Sign up to set email alerts
|

RBS: Redundant Bit Security Algorithm for RFID Systems

Abstract: In this paper, we propose a symmetric encryption algorithm for RFID systems called RBS (Redundant Bit Security). RBS is based on inserting redundant bits into the original data bits. The location of redundant bits inside the transmitted data represents the secret key. The redundant bits are generated by Light Weight Mac algorithm in order to provide integrity and authentication as well. The implemented hardware architecture meets the resource constraints of RFID systems, and encryption and decryption time is s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…RBS uses MAC [5]). Our approach provides confidentiality with integrity to the message independently, without support from any other algorithms.…”
Section: Background and Literature Reviewmentioning
confidence: 98%
See 3 more Smart Citations
“…RBS uses MAC [5]). Our approach provides confidentiality with integrity to the message independently, without support from any other algorithms.…”
Section: Background and Literature Reviewmentioning
confidence: 98%
“…Jeddi et al [5] proposed a symmetric key encryption algorithm called RBS (Redundant Bit Security) to offer confidentiality with integrity for RFID systems. They use the MAC algorithm to generate redundant bits, which helps offer integrity to the message.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, the plaintext must be manipulated before being merged with redundant data. In the first version of this algorithm [11], we used redundant data as keystream for manipulation the plaintext. This way, the algorithm was vulnerable to some attacks as there was a relation between redundant data and manipulated plaintext.…”
Section: Preliminaries Of Rbs Algorithmmentioning
confidence: 99%