Fig 1 - uploaded by Satyajayant Misra
Content may be subject to copyright.
A Simple 64-bit Non-Linear Feedback Shift Register

A Simple 64-bit Non-Linear Feedback Shift Register

Source publication
Conference Paper
Full-text available
An RFID system generally consists of tags, readers, and backend servers with the readers charged with authenticating/identifying the tags with the help of the servers. Two important enhancements have been suggested for widespread adoption of RFIDs, namely the use of low cost (5⊄ or less) passive RFID tags and serverless system design to overcome th...

Context in source publication

Context 1
... are bootstrapped with the information necessary to authenticate the tags. Also, there exist mechanisms (remote or on-site) to securely program the information about new tags in the reader(s). In our scheme, each tag T i is associated with ID i , a unique k-bit identifier, and NLFSR i , a unique k-bits NLFSR. A simple 64-bits NLFSR is depicted in Fig. 1. The NLFSR contains 9 gates with 5 XOR and 4 AND gates. Note that the types of gates (AND and XOR) and the tap positions of the gates can be used to identify an NLFSR. Each tag's NLFSR is made unique by ensuring that no two tags have the same combination of gates and tap positions. To illustrate, given a 32-bits NLFSR and choice of two ...

Similar publications

Article
Full-text available
Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema da...
Conference Paper
Full-text available
Cryptographic two-party protocols are used ubiquitously in everyday life. While some of these protocols are easy to understand and implement (e.g., key exchange or transmission of encrypted data), many of them are much more complex (e.g., e-banking and e-voting applications, or anonymous authentication and credential systems). For a software engine...
Conference Paper
Full-text available
The past year has seen increasing scrutiny of Smart Cities efforts with regard to privacy. Privacy advocates have criticized Smart City data collection on the whole and critiqued specific city efforts that they feel have crossed a line. Cities are struggling with a number of privacy issues, including how to address third parties' collection of Smar...
Article
Full-text available
The smart home field has witnessed rapid developments in recent years. Internet of Things applications for the smart home are very heterogeneous and continuously increasing in number, making user management from a security perspective very challenging. Moreover, the resource-constrained nature of most of the devices implies that any security mechan...
Article
In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation between tags and a trusted server. Active adversaries disrupt this synchrony, making a recovery strategy necessary. In some protocols, tags recover by replaying previously used...

Citations

... The development of serverless RFID security scheme, analysis on security, privacy, anonymity, etc. has raised people's attention [11]. Then, in 2011, Myneni et al. [9] proposed an anonymous protocol while Kim et al. [6] added untraceability in their own protocol. Sundaresan et al. [14] combined server-less searching protocols with low-cost RFID tags, which can narrow the range of research and enhance practicability of protocols. ...
Article
Full-text available
Radio frequency identification (RFID) has spread into many fields. Its security and privacy has received more and more attention. Based on traditional authentication protocols, some other branches related to practical applications have been introduced including server-less authentication and searching protocols. The server-less searching protocol is extended from server-less authentication protocol and both of them are executedwithout the support from the backend servers. Through analyzing some proposed protocols, we found that the probabilistic tracking attack is one of the major threats on the serverless RFID security protocols. The probability of being tracked and the cost on computation are related with the probability of the undesired tag's response. Based on the analysis, a practical conclusion is given which can be used in most of the server-less RFID systems.
... Since a tag in this protocol will reply with its group identifier when queried by a reader, an adversary can eavesdrop on this response and identify the tag based on its group in case there is no other tag of the same group at that moment, thus compromising the anonymity property of the tag. Myneni, Misra, & Xue, (2011) proposed an interesting protocol that utilizes a non-liner feedback shift register and logical operators (AND, OR, and XOR) to provide serverless mutual authentication with tag anonymity, it is called "SAMA" (Serverless Anonymous Mutual Authentication). In comparison with the previous serverless protocols, which implement a hash function to provide the authentication, the authors of the SAMA protocol claims that is has the least logical gates requirements and minimum clock cycles (1393 logical gates and 70 clock cycles). ...
... In comparison with the previous serverless protocols, which implement a hash function to provide the authentication, the authors of the SAMA protocol claims that is has the least logical gates requirements and minimum clock cycles (1393 logical gates and 70 clock cycles). Most common hash function implementations require at least 7000; conversely, low cost RFID passive tags have only 4000 gates reserved for security functions thus increasing overall cost (Myneni et al., 2011). Yin & Li, (2012) proposed "LP0" another protocol to provide serverless, anonymous, mutual authentication. ...
... (Z. Kim et al., 2011) Tag anonymity is compromised in cases where there is only a single tag from the same group in the reader vicinity. (Myneni et al., 2011) Increases tag design overall cost. (Yin & Li, 2012) Vulnerable to de-synchronization attacks. ...
Thesis
Full-text available
Radio Frequency Identification (RFID) is an emerging technology integrated in many applications such as access control systems, which often represent the bottleneck in the overall security of the entire system. Building this thesis on our previous research on the privacy and security of RFID access control systems without backend database, we propose an improved design for RFID access control system capable of alternating between offline and online authentication modes to adopt to the level of risk based on tailored risk scenarios and using our proposed risk calculation algorithm. The proposed design significantly improves on the level of security through the consideration of the risk as a proactive measure, greatly enhances on the access rights management in comparison with its predecessor design and interestingly integrates with almost any RFID tag.
Chapter
Non-orthogonal multiple access (NOMA) is considered as a promising multiple access technology, which could satisfy various incremental requirements of the coming fifth generation (5G) mobile communication system. As a novel NOMA scheme based on the joint design of the transmitter and receiver, pattern division multiple access (PDMA) could enhance spectrum efficiency significantly, compared to traditional orthogonal multiple access (OMA) schemes. In this paper, a particular pattern design of downlink PDMA in heterogeneous network is proposed. In overlapping deployment scenario of macro cells and small cells, the downlink signals are transmitted with a novel spatial and power domain superposition pattern. The user pairing and spatial/power allocation schemes are therefore proposed optimizing the pattern design. Analysis and simulation results illuminate the pattern design of downlink PDMA could enhance the spectrum efficiency obviously.
Conference Paper
Spectacular expansion of RFID systems and applications by several industries such as business, electronics, health, marketing, transportation, etc. has made RFID ever more popular. Within this context, the industry search for lower tag weight and low cost system together with solemn security to satisfy the consumer. Tag search is among the most requested protocols in such systems. Being light weight is regarded as another important specification for the said protocols, so that they can be utilized in low expense tags. In this paper, a server-less search protocol is proposed in low expense tags with the aid of NLFSRs and simple logical operations to conflict with security attacks. This protocol requires only a two steps information exchanges between tag and reader, and although it has simple structure, but is completely safe against most of the known security attacks. In comparison with other protocols, this protocol also requires a small number of gates for implementations. There are no need to exclude the collisions in tags as its other privileges.
Article
The security and privacy has become key issues in the RFID system. The information to be transmitted needs to rotate left according to the random number generated by reader, a cyclic shift of the lightweight mutual authentication protocol (CSLMAP) is put forward on the basis of Lightweight Mutual Authentication Protocol(LMAP), and then GYN logic is used to prove the safety of the proposed protocol. The result shows that the new protocol solves the problem of security and privacy in the Lightweight Mutual Authentication Protocol, and improves the efficiency of the authentication protocol, thus reducing the cost of the application of tags.