Abstract
We present a strong authentication mechanism intended for embedded systems based on standard but weak processors, without support for cryptographic operations. So far the main effort was to provide methods based on relatively short keys and complex computations, we make advantage of availability of non-volatile memory of larger size and confine ourselves to basic bit operations available on each processor.
Partially supported by Polish Ministry of Science and Higher Education, grants N N206 2701 33, NN 206 2573 35 and Foundation for Polish Science - Mistrz Programme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barczyński, K.: Coordinating communication in chosen RFID based systems. Master dissertation, Wrocław University of Technology, Wrocław, Poland (2008)
Cichoń, J., Klonowski, M., Kutyłowski, M.: Privacy protection for rfid with hidden subset identifiers. In: Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds.) PERVASIVE 2008. LNCS, vol. 5013, pp. 298–314. Springer, Heidelberg (2008)
Gilbert, H., Sibert, H., Robshaw, M.: An active attack against a provably secure lightweight authentication protocol. IEEE Electronic Letters 41, 1169–1170 (2005)
Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)
Juels, A.: Rfid security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)
Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID systems: A survey on security threats and proposed solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159–170. Springer, Heidelberg (2006)
Vajda, I., Buttyan, L.: Lightweight authentication protocols for low-cost rfid tags. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Barczyński, K., Błaśkiewicz, P., Klonowski, M., Kutyłowski, M. (2011). Self-keying Identification Mechanism for Small Devices. In: Park, J.J., Lopez, J., Yeo, SS., Shon, T., Taniar, D. (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22339-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-22339-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22338-9
Online ISBN: 978-3-642-22339-6
eBook Packages: Computer ScienceComputer Science (R0)