1 / 17

Time Cost Evaluation for Executing RFID Authentication Protocols

Time Cost Evaluation for Executing RFID Authentication Protocols. Yingjiu Li, Ph.D. Associate Professor School of Information Systems Singapore Management University Singapore. Contents. Introduction Time cost of cryptographic operations Time cost of communications

brinda
Download Presentation

Time Cost Evaluation for Executing RFID Authentication Protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Time Cost Evaluation for Executing RFID Authentication Protocols Yingjiu Li, Ph.D. Associate Professor School of Information Systems Singapore Management University Singapore

  2. Contents • Introduction • Time cost of cryptographic operations • Time cost of communications • Protocol classification and time cost • Conclusion

  3. Contents • Introduction • Time cost of cryptographic operations • Time cost of communications • Protocol classification and time cost • Conclusion

  4. Introduction • Time cost for executing an authentication protocol consists of three parts • Tr: time cost for cryptographic operations and looking up a database at a reader side • Tt: time cost for cryptographic operations at a tag side • Tc: time cost of communication between a reader and a tag • Objective • Provide a benchmark for protocol development

  5. Atmega 128 microcontroller Introduction • Development Environment • Emulator: UHF DemoTag, IAIK, TU Graz, Austria • Reader: CAEN WA828, Italy • We focus on Tt and Tc • Tr is negligible as compared with Tt and Tc

  6. Contents • Introduction • Time cost of cryptographic operations • Time cost of communications • Protocol classification and time cost • Conclusion

  7. Time cost of cryptographic operations • Time cost for a DemoTag to run cryptographic operations: • Hashing: MD5, SHA-1, SHA-256, SHA-512 • Crypto: AES-128, AES-192, AES-256 • Ultra-lightweight: PRESENT-80

  8. Time cost of cryptographic operations • Time cost for a DemoTag to run cryptographic operations: • Hashing: MD5, SHA-1, SHA-256, SHA-512 • Crypto: AES-128, AES-192, AES-256 • Ultra-lightweight: PRESENT-80

  9. Contents • Introduction • Time cost of cryptographic operations • Time cost of communications • Protocol classification and time cost • Conclusion

  10. Time cost of communications • Time cost of communications • Tag-to-tag Read/Write operations • Read: 0007ms / 16-bit word • Write: 16.7ms / 16-bit word • Reader-to-tag Read/Write operations

  11. Contents • Introduction • Time cost of cryptographic operations • Time cost of communications • Protocol classification and time cost • Conclusion

  12. Protocol classification and time cost • Four types of authentication protocols • RAO: reader authentication only • A reader authenticates its legitimacy to a tag • TAO: tag authentication only • A tag authenticates its legitimacy to a reader • TRA: tag-then-reader authentication • A tag authenticates its legitimacy to a reader and then the reader authenticates its legitimacy to the tag • RTA: reader-then-tag authentication • A reader authenticates its legitimacy to a tag and then the tag authenticates its legitimacy to the reader

  13. Protocol classification and time cost • Four types of authentication protocols • Different types of protocols have different numbers of rounds of communications between a reader and a tag • Communication time Tc takes the major time cost for executing a protocol, as shown in the figure in the next slide

  14. Protocol classification and time cost • Communication time Tc takes the major time cost for executing a protocol, as shown in the figure

  15. Contents • Introduction • Time cost of cryptographic operations • Time cost of communications • Protocol classification and time cost • Conclusion

  16. Conclusion • We have conducted pioneering study for time cost evaluation of RFID authentication protocols • Future work • Conduct some other asymmetric cryptographic operations like ECC, RSA, etc • Conduct experiments on WISP tag platform

  17. Question?

More Related