首页> 外文期刊>Industrial Electronics, IEEE Transactions on >Implementation of $2^{n},- ,2^{k},- ,1$ Modulo Adder Based RFID Mutual Authentication Protocol
【24h】

Implementation of $2^{n},- ,2^{k},- ,1$ Modulo Adder Based RFID Mutual Authentication Protocol

机译:$ 2 ^ {n},-,2 ^ {k},-,1 $基于模加器的RFID相互认证协议的实现

获取原文
获取原文并翻译 | 示例
       

摘要

In wireless communication, secure transmission and reception of data are the major concern today. In recent years, Radio Frequency Identification (RFID) has played a vital role in the security system for secured data communication. The main challenge in RFID-based security system is to design a more secure, better area and power efficient encoder architecture for tag-reader mutual authentication protocol. This paper proposes new and efficient encoder architecture for RFID mutual authentication protocol which utilizes 2n - 2k - 1 modulo adder for achieving higher security. The proposed architecture is described in Verilog hardware description language and the functionalities are verified and synthesized using Altera Quartus II tool. The architecture is also synthesized using Cadence RTL compiler for 180 and 90 nm technology. Experimental results of the proposed scheme give better performances in terms of area, power, and delay when compared with existing mutual authentication schemes. In addition to that, the architecture is realized as hardware in Altera DE2 Cyclone II (EP2C35F672C6) field programmable gate array and real time verification has been carried out using Logic Analyzer 16851A. Finally, formal security analysis has been performed using the Burrows-Abadi-Needham (BAN) logic to show that the proposed protocol is secure.
机译:在无线通信中,数据的安全传输和接收是当今的主要问题。近年来,射频识别(RFID)在安全数据通信安全系统中扮演着至关重要的角色。基于RFID的安全系统的主要挑战是为标签读取器相互认证协议设计更安全,面积更小,功率效率更高的编码器体系结构。本文提出了一种新的高效的RFID相互认证协议编码器架构,该架构利用2 n -2 k -1模加法器实现更高的安全性。用Verilog硬件描述语言描述了所建议的体系结构,并使用Altera Quartus II工具对功能进行了验证和综合。该架构还使用Cadence RTL编译器针对180和90 nm技术进行了综合。与现有的相互认证方案相比,该方案的实验结果在面积,功率和延迟方面都具有更好的性能。除此之外,该架构在Altera DE2 Cyclone II(EP2C35F672C6)现场可编程门阵列中作为硬件实现,并且已经使用逻辑分析仪16851A进行了实时验证。最后,已经使用Burrows-Abadi-Needham(BAN)逻辑进行了正式的安全分析,以表明所提出的协议是安全的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号