Publication Type
Conference Proceeding Article
Version
submittedVersion
Publication Date
12-2010
Abstract
There are various reader/tag authentication protocols proposed for the security of RFID systems. Such a protocol normally contains several rounds of conversations between a tag and a reader and involves cryptographic operations at both reader and tag sides. Currently there is a lack of benchmarks that provide a fair comparison platform for (a) the time cost of cryptographic operations at the tag side and (b) the time cost of data exchange between a reader and a tag, making it impossible to evaluate the total time cost for executing a protocol. Based on our experiments implemented on IAIK UHF tag emulators (known as DemoTags), in this paper we present detailed benchmarks of both time costs for RFID authentication protocols. Our results reveal that the data exchange dominates the time cost for running a protocol. We also give a classification for the existing protocols and summarise formulae of time cost evaluation for each type of protocols in a way so that a user can evaluate the time cost of a protocol amongst several choices of cryptographic operations in an application.
Discipline
Information Security
Research Areas
Cybersecurity
Publication
2010 Internet of Things: IOT, Tokyo, Japan, November 29 - December 1: Proceedings
First Page
1
Last Page
8
ISBN
9781424474134
Identifier
10.1109/IOT.2010.5678437
Publisher
IEEE
City or Country
Piscataway, NJ
Citation
CHIEW, Kevin; LI, Yingjiu; LI, Tieyan; DENG, Robert H.; and AIGNER, Manfred.
Time cost evaluation for executing RFID authentication protocols. (2010). 2010 Internet of Things: IOT, Tokyo, Japan, November 29 - December 1: Proceedings. 1-8.
Available at: https://ink.library.smu.edu.sg/sis_research/639
Copyright Owner and License
Authors
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1109/IOT.2010.5678437