Time cost evaluation for executing RFID authentication protocols

There are various reader/tag authentication protocols proposed for the security of RFID systems. Such a protocol normally contains several rounds of conversations between a tag and a reader and involves cryptographic operations at both reader and tag sides. Currently there is a lack of benchmarks th...

Full description

Saved in:
Bibliographic Details
Main Authors: CHIEW, Kevin, LI, Yingjiu, LI, Tieyan, DENG, Robert H., AIGNER, Manfred
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2010
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/639
https://ink.library.smu.edu.sg/context/sis_research/article/1638/viewcontent/Time_cost_evaluation_RFID_IoT_2010_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1638
record_format dspace
spelling sg-smu-ink.sis_research-16382019-01-08T08:09:17Z Time cost evaluation for executing RFID authentication protocols CHIEW, Kevin LI, Yingjiu LI, Tieyan DENG, Robert H. AIGNER, Manfred There are various reader/tag authentication protocols proposed for the security of RFID systems. Such a protocol normally contains several rounds of conversations between a tag and a reader and involves cryptographic operations at both reader and tag sides. Currently there is a lack of benchmarks that provide a fair comparison platform for (a) the time cost of cryptographic operations at the tag side and (b) the time cost of data exchange between a reader and a tag, making it impossible to evaluate the total time cost for executing a protocol. Based on our experiments implemented on IAIK UHF tag emulators (known as DemoTags), in this paper we present detailed benchmarks of both time costs for RFID authentication protocols. Our results reveal that the data exchange dominates the time cost for running a protocol. We also give a classification for the existing protocols and summarise formulae of time cost evaluation for each type of protocols in a way so that a user can evaluate the time cost of a protocol amongst several choices of cryptographic operations in an application. 2010-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/639 info:doi/10.1109/IOT.2010.5678437 https://ink.library.smu.edu.sg/context/sis_research/article/1638/viewcontent/Time_cost_evaluation_RFID_IoT_2010_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
CHIEW, Kevin
LI, Yingjiu
LI, Tieyan
DENG, Robert H.
AIGNER, Manfred
Time cost evaluation for executing RFID authentication protocols
description There are various reader/tag authentication protocols proposed for the security of RFID systems. Such a protocol normally contains several rounds of conversations between a tag and a reader and involves cryptographic operations at both reader and tag sides. Currently there is a lack of benchmarks that provide a fair comparison platform for (a) the time cost of cryptographic operations at the tag side and (b) the time cost of data exchange between a reader and a tag, making it impossible to evaluate the total time cost for executing a protocol. Based on our experiments implemented on IAIK UHF tag emulators (known as DemoTags), in this paper we present detailed benchmarks of both time costs for RFID authentication protocols. Our results reveal that the data exchange dominates the time cost for running a protocol. We also give a classification for the existing protocols and summarise formulae of time cost evaluation for each type of protocols in a way so that a user can evaluate the time cost of a protocol amongst several choices of cryptographic operations in an application.
format text
author CHIEW, Kevin
LI, Yingjiu
LI, Tieyan
DENG, Robert H.
AIGNER, Manfred
author_facet CHIEW, Kevin
LI, Yingjiu
LI, Tieyan
DENG, Robert H.
AIGNER, Manfred
author_sort CHIEW, Kevin
title Time cost evaluation for executing RFID authentication protocols
title_short Time cost evaluation for executing RFID authentication protocols
title_full Time cost evaluation for executing RFID authentication protocols
title_fullStr Time cost evaluation for executing RFID authentication protocols
title_full_unstemmed Time cost evaluation for executing RFID authentication protocols
title_sort time cost evaluation for executing rfid authentication protocols
publisher Institutional Knowledge at Singapore Management University
publishDate 2010
url https://ink.library.smu.edu.sg/sis_research/639
https://ink.library.smu.edu.sg/context/sis_research/article/1638/viewcontent/Time_cost_evaluation_RFID_IoT_2010_afv.pdf
_version_ 1770570630058475520