Souhir Gabsi, V. Beroulle, Hamdi Bilgacem, M. Machhout
{"title":"实现安全的基于ecc的轻量级RFID标签的体系结构选择","authors":"Souhir Gabsi, V. Beroulle, Hamdi Bilgacem, M. Machhout","doi":"10.1109/DTSS.2019.8914902","DOIUrl":null,"url":null,"abstract":"RFID (Radio Frequency Identification) allows the remote identification of objects or people through a reader that captures the information contained in an RFID tag. If the transmission between the tag and the reader is not properly protected, it is then possible for an unauthorized user to access the transmitted data. To protect the transmission between the tag and the reader, the best solution is to implement a public key based cryptosystem. This cryptosystem will ensure the mutual authentication of the tags and the readers. However, it is also necessary consider both Side Channel Attacks (SCA) exploiting the cryptosystem leakage and the Fault Attacks exploiting the tag faulty behaviors. In this paper, we make a comparative study between some authentication protocols based on ECC cryptography and choose the most secured one for low cost and low power RFID tags. Then, we choose a scalar multiplication algorithm robust against the SCA and FA and taking into account the low resources available in the RFID tags. This work contains the main guidelines for implementing a low cost and low power RFID tag based on ECC cryptography and secure against SCA and FA.","PeriodicalId":342516,"journal":{"name":"2019 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Architectural Choices for Implementing a Secure ECC-based Lightweight RFID Tag\",\"authors\":\"Souhir Gabsi, V. Beroulle, Hamdi Bilgacem, M. Machhout\",\"doi\":\"10.1109/DTSS.2019.8914902\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"RFID (Radio Frequency Identification) allows the remote identification of objects or people through a reader that captures the information contained in an RFID tag. If the transmission between the tag and the reader is not properly protected, it is then possible for an unauthorized user to access the transmitted data. To protect the transmission between the tag and the reader, the best solution is to implement a public key based cryptosystem. This cryptosystem will ensure the mutual authentication of the tags and the readers. However, it is also necessary consider both Side Channel Attacks (SCA) exploiting the cryptosystem leakage and the Fault Attacks exploiting the tag faulty behaviors. In this paper, we make a comparative study between some authentication protocols based on ECC cryptography and choose the most secured one for low cost and low power RFID tags. Then, we choose a scalar multiplication algorithm robust against the SCA and FA and taking into account the low resources available in the RFID tags. This work contains the main guidelines for implementing a low cost and low power RFID tag based on ECC cryptography and secure against SCA and FA.\",\"PeriodicalId\":342516,\"journal\":{\"name\":\"2019 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)\",\"volume\":\"170 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DTSS.2019.8914902\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DTSS.2019.8914902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Architectural Choices for Implementing a Secure ECC-based Lightweight RFID Tag
RFID (Radio Frequency Identification) allows the remote identification of objects or people through a reader that captures the information contained in an RFID tag. If the transmission between the tag and the reader is not properly protected, it is then possible for an unauthorized user to access the transmitted data. To protect the transmission between the tag and the reader, the best solution is to implement a public key based cryptosystem. This cryptosystem will ensure the mutual authentication of the tags and the readers. However, it is also necessary consider both Side Channel Attacks (SCA) exploiting the cryptosystem leakage and the Fault Attacks exploiting the tag faulty behaviors. In this paper, we make a comparative study between some authentication protocols based on ECC cryptography and choose the most secured one for low cost and low power RFID tags. Then, we choose a scalar multiplication algorithm robust against the SCA and FA and taking into account the low resources available in the RFID tags. This work contains the main guidelines for implementing a low cost and low power RFID tag based on ECC cryptography and secure against SCA and FA.