{"title":"SLAP - A Secure but Light Authentication Protocol for RFID Based on Modular Exponentiation","authors":"B. Toiruul, K. Lee, Jin Mook Kim","doi":"10.1109/UBICOMM.2007.41","DOIUrl":null,"url":null,"abstract":"The advantage of using RFID technology is gaining much attention as is seen by an increase in its deployment. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. This work describes simple, inexpensive, and untraceable mutual identification protocols based on modular exponentiation for RFID tags. The proposed authentication mechanism is a low-cost but high-security for protecting consumer's information in RFID tag against unwanted read-attacks. We analyzed with issues of the security and privacy of RFID systems. This paper also showed the 8-bit architecture of a low-power and low die-size implementation of modular exponentiation. The 8-bit modular exponentiation implementation has a chip area of less than 1 K gates and the encryption of 64 bits requires about 1000 clock cycles. The executing time of the proposed protocol would range from 12.36 ms to 20.6 ms, with 6-8 tags authenticated per second.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UBICOMM.2007.41","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
The advantage of using RFID technology is gaining much attention as is seen by an increase in its deployment. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. This work describes simple, inexpensive, and untraceable mutual identification protocols based on modular exponentiation for RFID tags. The proposed authentication mechanism is a low-cost but high-security for protecting consumer's information in RFID tag against unwanted read-attacks. We analyzed with issues of the security and privacy of RFID systems. This paper also showed the 8-bit architecture of a low-power and low die-size implementation of modular exponentiation. The 8-bit modular exponentiation implementation has a chip area of less than 1 K gates and the encryption of 64 bits requires about 1000 clock cycles. The executing time of the proposed protocol would range from 12.36 ms to 20.6 ms, with 6-8 tags authenticated per second.