Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
| dc.contributor.author | Madiha Khalid, 01-281162-002 | |
| dc.date.accessioned | 2024-02-19T10:51:45Z | |
| dc.date.available | 2024-02-19T10:51:45Z | |
| dc.date.issued | 2023 | |
| dc.identifier.uri | http://hdl.handle.net/123456789/16939 | |
| dc.description | Supervised by Dr. Muhammad Najam-ul-Islam | en_US |
| dc.description.abstract | IoT devices collect and process information from remote locations and have significantly increased the productivity of ubiquitous networks. Smart sensing devices spanning the IoT ecosystem do not have powerful processors and the amount of memory is usually measured in kilobytes, so the traditional mechanisms can not be installed on the sensing layer resource constraint devices. The ultrahigh-frequency passive RFID tags are the most adopted resource constraint IoT devices that use ultralightweight mutual authentication protocols for the authenticated encryption of the tag/reader communication. In this thesis, the design flaws of ultralightweight ciphers are analyzed by challenging their confdentiality, integrity, and availability claims. These highlighted weaknesses are rectified by proposing the Extremely Good Privacy (EGP) protocol. The proposed cipher offers mutual authentication and the tag’s ID encipherment. The security characteristics of the EGP protocol i.e. resilience against full disclosure, traceability, impersonation, and denial of service attacks have been validated using formal and functional analysis. In addition to this, the 96-bit EGP protocol is experimentally validated as an ultralightweight cipher by deploying the ASIC architecture with an implementation cost of 3826 gate equivalents. This cost is within the upper bound of 5400 gate equivalents, the resource utilization benchmark for the ultralightweight ciphers. In the present era, quantum computing has challenged binary computing fundamentals. Quantum computing has the ability to reduce the time complexity of brute force attacks on the ultralightweight cipher by quadratic factor. The final contribution of this work is an early step towards the security and privacy of the RFID system counterpart of the post-Moore era. The Quantum Resilient Ultralightweight Authentication Protocol (QRUAP) is a hybrid cipher that ensures information-theoretically secure communication by virtue of the non-cloning property of the quantum channel. The theoretical verification of the cipher is also presented using IBM Qiskit. In addition to this, the 32-bit QRUAP emulation can be classified as a classical ultralightweight cipher by virtue of its implementation cost of 5418 gate equivalents on 180nm CMOS technology. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Electrical Engineering, Bahria University Engineering School Islamabad | en_US |
| dc.relation.ispartofseries | PhD(EE);T-2549 | |
| dc.subject | Electrical Engineering | en_US |
| dc.subject | Tewari & Gupta Authentication Protocol | en_US |
| dc.subject | Finite State Machine | en_US |
| dc.title | Secure Architecture For Resource Constraint Rfid Enabled Iot Applications | en_US |
| dc.type | PhD Thesis | en_US |