Mutual authentication protocol model for low-cost rfid systems based on shelled random value

dc.contributor.authorSalam al-Dala'ien, Mu' awya Naser
dc.date.accessioned2015-07-30T02:22:07Z
dc.date.available2015-07-30T02:22:07Z
dc.date.issued2011
dc.description.abstractDesigning a reliable secure low-cost protocol for radio-frequency identification (RFID) is difficult, standard cryptographic primitives can become a limitation for low-cost tags due to their costly large requirements in terms of circuit size, power consumption, and memory size. Therefore, ultralightweight cryptography in designing low-cost RFID protocols capable of executing data communication sessions'·efficiently and effectively are needed to solve database loading, passive attacks, desynchronization and high computational cost problems. This thesis presents a model (SRV) for designing efficient low-cost security protocols, and proposes two low-cost RFID secure protocols (SURV and SLRV) based on ultralightweight and lightweight mutual authentication usmg a combination of conventional and unconventional security primitives. Comprehensive qualitative and quantitative evaluations were performed on the designed protocols. Both protocols have been analyzed qualitatively for its ability to provide data confidentiality, tag anonymity, mutual authentication and data integrity, capability to handle forward security and replay attacks, desynchronization, and man-in- the-middle and disclosure attacks. Both protocols achieved significant positive security performance in all aspects compared to all protocols in the studied literature. Similarly, both protocols have been evaluated quantitatively using Diehard and ENT tools for passive attacks, which proofed high security through highly randomized messages, and against database loading using three different search algorithms on three datasets with different sizes alternatively. Furthermore, proposed implementations have been put forward to illustrate the cost efficiency for the proposed protocols. The evaluation also included security verification using the A VISP A tools. However, the results on the capability of A VISP A to verify RFID protocols in general and our protocols in particular, came out negative.en_US
dc.identifier.urihttp://hdl.handle.net/123456789/917
dc.language.isoenen_US
dc.subjectProtocol modelen_US
dc.subjectRFID Systemsen_US
dc.subjectShelled randomen_US
dc.titleMutual authentication protocol model for low-cost rfid systems based on shelled random valueen_US
dc.typeThesisen_US
Files
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: