Secure Architecture For Resource Constraint Rfid Enabled Iot Applications

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Madiha Khalid, 01-281162-002
dc.date.accessioned 2024-02-19T10:51:45Z
dc.date.available 2024-02-19T10:51:45Z
dc.date.issued 2023
dc.identifier.uri http://hdl.handle.net/123456789/16939
dc.description Supervised by Dr. Muhammad Najam-ul-Islam en_US
dc.description.abstract IoT devices collect and process information from remote locations and have significantly increased the productivity of ubiquitous networks. Smart sensing devices spanning the IoT ecosystem do not have powerful processors and the amount of memory is usually measured in kilobytes, so the traditional mechanisms can not be installed on the sensing layer resource constraint devices. The ultrahigh-frequency passive RFID tags are the most adopted resource constraint IoT devices that use ultralightweight mutual authentication protocols for the authenticated encryption of the tag/reader communication. In this thesis, the design flaws of ultralightweight ciphers are analyzed by challenging their confdentiality, integrity, and availability claims. These highlighted weaknesses are rectified by proposing the Extremely Good Privacy (EGP) protocol. The proposed cipher offers mutual authentication and the tag’s ID encipherment. The security characteristics of the EGP protocol i.e. resilience against full disclosure, traceability, impersonation, and denial of service attacks have been validated using formal and functional analysis. In addition to this, the 96-bit EGP protocol is experimentally validated as an ultralightweight cipher by deploying the ASIC architecture with an implementation cost of 3826 gate equivalents. This cost is within the upper bound of 5400 gate equivalents, the resource utilization benchmark for the ultralightweight ciphers. In the present era, quantum computing has challenged binary computing fundamentals. Quantum computing has the ability to reduce the time complexity of brute force attacks on the ultralightweight cipher by quadratic factor. The final contribution of this work is an early step towards the security and privacy of the RFID system counterpart of the post-Moore era. The Quantum Resilient Ultralightweight Authentication Protocol (QRUAP) is a hybrid cipher that ensures information-theoretically secure communication by virtue of the non-cloning property of the quantum channel. The theoretical verification of the cipher is also presented using IBM Qiskit. In addition to this, the 32-bit QRUAP emulation can be classified as a classical ultralightweight cipher by virtue of its implementation cost of 5418 gate equivalents on 180nm CMOS technology. en_US
dc.language.iso en en_US
dc.publisher Electrical Engineering, Bahria University Engineering School Islamabad en_US
dc.relation.ispartofseries PhD(EE);T-2549
dc.subject Electrical Engineering en_US
dc.subject Tewari & Gupta Authentication Protocol en_US
dc.subject Finite State Machine en_US
dc.title Secure Architecture For Resource Constraint Rfid Enabled Iot Applications en_US
dc.type PhD Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account