Akcije

Telfor Journal
kako citirati ovaj članak
podeli ovaj članak

Metrika

  • citati u SCIndeksu: 0
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[]
  • posete u poslednjih 30 dana:2
  • preuzimanja u poslednjih 30 dana:2

Sadržaj

članak: 1 od 1  
2019, vol. 11, br. 1, str. 58-63
Analysis and evaluation of three methods for tag identification in OSK RFID protocol
(naslov ne postoji na srpskom)
aUniverzitet Singidunum, Beograd, Srbija
bUniverzitet u Beogradu, Elektrotehnički fakultet, Srbija

e-adresavitomasevic@singidunum.ac.rs, mvt@rs.rs
Projekat:
Razvoj novih informaciono-komunikacionih tehnologija, korišćenjem naprednih matematičkih metoda, sa primenama u medicini, telekomunikacijama, energetici, zaštititi nacionalne baštine i obrazovanju (MPNTR - 44006)
Razvoj digitalnih tehnologija i umreženih servisa u sistemima sa ugrađenim elektronskim komponentama (MPNTR - 44009)

Ključne reči: OSK protocol; TMTO method; tag identification; state look-up table; chaining
Sažetak
(ne postoji na srpskom)
Feasibility for improving the efficiency of the tag identification phase in OSK (Ohkubo, Suzuki i Kinoshita) RFID protocol is analyzed in this paper. First, the basic identification technique is presented in general. Then, a procedure for speeding up the identification by employment of TMTO (Time Memory Trade Off) approach is explained. Balancing between memory and time requirements is achieved with the chaining technique and introduction of an off-line, preparatory phase. As an additional effort, a second TMTObased level is proposed. It relies on a special look-up table which consists of the equidistant states generated during preparatory phase. The complexity of the proposed technique is discussed along with some numerical evaluation results obtained through experiments.
Reference
Avoine, G., Oechslin, P. (2005) A Scalable and Provably Secure Hash-Based RFID Protocol. u: IEEE International Conference on Pervasive Computing and Communications, Hawaii, USA, 110-114
Avoine, G., Bingol, M.A., Carpent, X., Yalcin, S.B.O. (2012) Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography. IEEE Transactions on Mobile Computing, 12(10): 2037-2049
Avoine, G., Bourgeois, A., Carpent, X. (2015) Analysis of Rainbow Tables with Fingerprints. u: Information Security and Privacy (LNCS), Springer International Publishing, vol. 9144, pp. 356-374
Chang, J., Wu, H. (2016) On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory. J. of Information Science & Engineering, vol. 32, no. 4, pp. 887-901
Hellman, M. (1980) A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory, 26(4): 401-406
Jung, K., Lee, S. (2015) A systematic review of RFID applications and diffusion: Key areas and public policy issues. Journal of Open Innovation: Technology, Market, and Complexity, 1(1)
Kaur, M., Sandhu, M., Mohan, N., Sandhu, P.S. (2011) RFID Technology Principles, Advantages, Limitations & Its Applications. International Journal of Computer and Electrical Engineering, 3(1): 151-157
Liu, G., Zhang, H., Kong, F., Zhang, L. (2018) A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography. Wireless Personal Communications, 101(3): 1445-1455
Oechslin, P. (2003) Making a Faster Cryptanalytic Time-Memory Trade-Off. u: Advances in Cryptology: CRYPTO 2003 (LNCS), Berlin-Heidelberg: Springer, 2729, pp. 617-630
Ohkubo, M., Suzuki, K., Kinoshita, S. (2003) Cryptographic Approach to 'Privacy Friendly' Tags. u: RFID Privacy Workshop, mit, USA
Syamsuddin, I., Dillon, T., Chang, E., Han, S. (2008) A Survey of RFID Authentication Protocols Based on Hash-Chain Method. u: International Conference on Convergence and Hybrid Information Technology, Busan, South Korea
Tomašević, V., Tomašević, M. (2018) Speeding Up Tag Identification in OSK RFID Protocol. u: 2018 26th Telecommunications Forum (TELFOR), Belgrade, (in Serbian), 1-4
Tomašević, V., Tomašević, M. (2016) Time-Memory Trade-Off in RFID Systems. u: Int. Scientific Conf. on ICT and E-Business Related Research - Sinteza, Singidunum University, Belgrade, Serbia, 124-130
Tomašević, V., Tomašević, M. (2019) Double Time-Memory Trade-Off in OSK RFID Protocol. Wireless Personal Communications, 108(1): 551-568
Tomašević, V., Tomašević, M. (2013) An analysis of chain characteristics in the cryptanalytic TMTO method. Theoretical Computer Science, 501: 52-61
Yang, L., Yu, P., Bailing, W., Yun, Q., Xuefeng, B., Xinling, Y., Zelong, Y. (2013) Hash-based RFID Mutual Authentication Protocol. Int. J. of Security and its Applications, 7(3): 183-194
Zhuang, X., Zhu, Y., Chang, C., Peng, Q. (2018) Security Issues in Ultralightweight RFID Authentication Protocols. Wireless Personal Communications, 98(1): 779-814
 

O članku

jezik rada: engleski
vrsta rada: neklasifikovan
DOI: 10.5937/telfor1901058T
objavljen u SCIndeksu: 19.08.2019.

Povezani članci

Nema povezanih članaka