You are looking at a specific version 20180531:081917 of this paper. See the latest version.

Paper 2018/214

RMAC -- A Lightweight Authentication Protocol for Highly Constrained IoT Devices

Ahmad Khoureich Ka

Abstract

Nowadays, RFID systems have earned an important place in our everyday lives. Its adoption is growing in areas where data security or privacy or both must be guaranteed. Since the RFID tag can be cloned, it is necessary to develop appropriate security solutions for these systems. Fortunately, many papers have proposed solutions for encryption or authentication. But it turns out that sometimes the proposal has security flaw or is too complicated for the RFID tag (which has very limited computing resources). In this paper we introduce a new authentication protocol using a new approach. Our proposal named R-MAC is well suited for RFID tags since it uses simple and lightweight constructions. R-MAC is at least as secure as the Mirror-Mac protocol introduced by Petros Mol et al.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
RFIDMACauthenticationlightweight protocolXor-Cascade Encryption
Contact author(s)
ahmadkhoureich ka @ uadb edu sn
History
2019-02-07: last of 2 revisions
2018-02-26: received
See all versions
Short URL
https://ia.cr/2018/214
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.