- citati u SCIndeksu: 0
- citati u CrossRef-u:0
- citati u Google Scholaru:[
]
- posete u poslednjih 30 dana:2
- preuzimanja u poslednjih 30 dana:2
|
|
2019, vol. 11, br. 1, str. 58-63
|
Analysis and evaluation of three methods for tag identification in OSK RFID protocol
(naslov ne postoji na srpskom)
Projekat: Razvoj novih informaciono-komunikacionih tehnologija, korišćenjem naprednih matematičkih metoda, sa primenama u medicini, telekomunikacijama, energetici, zaštititi nacionalne baštine i obrazovanju (MPNTR - 44006) Razvoj digitalnih tehnologija i umreženih servisa u sistemima sa ugrađenim elektronskim komponentama (MPNTR - 44009)
Ključne reči: OSK protocol; TMTO method; tag identification; state look-up table; chaining
Sažetak
(ne postoji na srpskom)
Feasibility for improving the efficiency of the tag identification phase in OSK (Ohkubo, Suzuki i Kinoshita) RFID protocol is analyzed in this paper. First, the basic identification technique is presented in general. Then, a procedure for speeding up the identification by employment of TMTO (Time Memory Trade Off) approach is explained. Balancing between memory and time requirements is achieved with the chaining technique and introduction of an off-line, preparatory phase. As an additional effort, a second TMTObased level is proposed. It relies on a special look-up table which consists of the equidistant states generated during preparatory phase. The complexity of the proposed technique is discussed along with some numerical evaluation results obtained through experiments.
|
|
|
Reference
|
|
Avoine, G., Oechslin, P. (2005) A Scalable and Provably Secure Hash-Based RFID Protocol. u: IEEE International Conference on Pervasive Computing and Communications, Hawaii, USA, 110-114
|
|
Avoine, G., Bingol, M.A., Carpent, X., Yalcin, S.B.O. (2012) Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography. IEEE Transactions on Mobile Computing, 12(10): 2037-2049
|
|
Avoine, G., Bourgeois, A., Carpent, X. (2015) Analysis of Rainbow Tables with Fingerprints. u: Information Security and Privacy (LNCS), Springer International Publishing, vol. 9144, pp. 356-374
|
|
Chang, J., Wu, H. (2016) On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory. J. of Information Science & Engineering, vol. 32, no. 4, pp. 887-901
|
|
Hellman, M. (1980) A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory, 26(4): 401-406
|
|
Jung, K., Lee, S. (2015) A systematic review of RFID applications and diffusion: Key areas and public policy issues. Journal of Open Innovation: Technology, Market, and Complexity, 1(1)
|
|
Kaur, M., Sandhu, M., Mohan, N., Sandhu, P.S. (2011) RFID Technology Principles, Advantages, Limitations & Its Applications. International Journal of Computer and Electrical Engineering, 3(1): 151-157
|
|
Liu, G., Zhang, H., Kong, F., Zhang, L. (2018) A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography. Wireless Personal Communications, 101(3): 1445-1455
|
|
Oechslin, P. (2003) Making a Faster Cryptanalytic Time-Memory Trade-Off. u: Advances in Cryptology: CRYPTO 2003 (LNCS), Berlin-Heidelberg: Springer, 2729, pp. 617-630
|
|
Ohkubo, M., Suzuki, K., Kinoshita, S. (2003) Cryptographic Approach to 'Privacy Friendly' Tags. u: RFID Privacy Workshop, mit, USA
|
|
Syamsuddin, I., Dillon, T., Chang, E., Han, S. (2008) A Survey of RFID Authentication Protocols Based on Hash-Chain Method. u: International Conference on Convergence and Hybrid Information Technology, Busan, South Korea
|
|
Tomašević, V., Tomašević, M. (2018) Speeding Up Tag Identification in OSK RFID Protocol. u: 2018 26th Telecommunications Forum (TELFOR), Belgrade, (in Serbian), 1-4
|
|
Tomašević, V., Tomašević, M. (2016) Time-Memory Trade-Off in RFID Systems. u: Int. Scientific Conf. on ICT and E-Business Related Research - Sinteza, Singidunum University, Belgrade, Serbia, 124-130
|
|
Tomašević, V., Tomašević, M. (2019) Double Time-Memory Trade-Off in OSK RFID Protocol. Wireless Personal Communications, 108(1): 551-568
|
|
Tomašević, V., Tomašević, M. (2013) An analysis of chain characteristics in the cryptanalytic TMTO method. Theoretical Computer Science, 501: 52-61
|
|
Yang, L., Yu, P., Bailing, W., Yun, Q., Xuefeng, B., Xinling, Y., Zelong, Y. (2013) Hash-based RFID Mutual Authentication Protocol. Int. J. of Security and its Applications, 7(3): 183-194
|
|
Zhuang, X., Zhu, Y., Chang, C., Peng, Q. (2018) Security Issues in Ultralightweight RFID Authentication Protocols. Wireless Personal Communications, 98(1): 779-814
|
|
|
|