E±cient Hardware Implementation of KMAPþ: An Ultralightweight Mutual Authentication Protocol ¤

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Umar Mujahid
dc.contributor.author M. Najam-ul-Islam
dc.contributor.author Madiha Khalid
dc.date.accessioned 2018-11-12T10:15:40Z
dc.date.available 2018-11-12T10:15:40Z
dc.date.issued 2017
dc.identifier.uri http://hdl.handle.net/123456789/7690
dc.description.abstract Internet of Things (IoTs) are becoming one of the integral parts of our lives, as all of the modern devices including pervasive systems use internet for its connectivity with the rest of the world. The Radio Frequency IDenti¯cation (RFID) provides unique identi¯cation and nonline of sight capabilities, therefore plays a very important role in development of IoTs. However, the RFID systems incorporate wireless channel for communication, therefore have some allied risks to the system from threat agents. In order to prevent the system from malicious activities in a cost e®ective way, numerous Ultralightweight Mutual Authentication Protocols (UMAPs) have been proposed since last decade. These UMAPs mainly involve simple bitwise logical operators such as XOR, AND, OR, etc., in their designs and can be implemented with extremely low cost RFID tags. However, most of the UMAP designers didn't provide the proper hardware approximations of their UMAPs and presented only theoretical results which mostly mislead the reader. In this paper, we have addressed this problem by reporting our experiences with FPGA and ASIC-based implementation of UMAP named psuedo Kasami code-based Mutual Authentication Protocol (KMAPþÞ. Further, we have also improved the structure of the KMAP protocol to overcome the previously highlighted attack model. The hardware implementation results show that KMAPþ successfully conform to EPC-C1G2 tags and can be implemented using less than 4K GE (for 32-bit word length). en_US
dc.language.iso en en_US
dc.publisher Bahria University Islamabad Campus en_US
dc.relation.ispartofseries ;DOI: 10.1142/S0218126618500330
dc.subject Department of Electrical Engineering en_US
dc.title E±cient Hardware Implementation of KMAPþ: An Ultralightweight Mutual Authentication Protocol ¤ en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account