2013
DOI: 10.20533/ijrfidsc.2046.3715.2013.0007
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of an Encryption Algorithm for use in RFID System

Abstract: The

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 8 publications
0
12
0
1
Order By: Relevance
“…These sensors are unlikely to be properly secured, which would make them easy to be exploited [93]. In summary, DoS have been found to be more problematic, because if more devices are interconnected, the more intruders could have access to them [94]. As the more and more devices become connected to IoT without proper algorithms or algorithms with weak avalanche effects, vulnerabilities could increase allowing intruders to connect to fake devices that could also be used in such attacks [37], [95].…”
Section: Types Of Attacks On Internet Of Thingsmentioning
confidence: 99%
See 1 more Smart Citation
“…These sensors are unlikely to be properly secured, which would make them easy to be exploited [93]. In summary, DoS have been found to be more problematic, because if more devices are interconnected, the more intruders could have access to them [94]. As the more and more devices become connected to IoT without proper algorithms or algorithms with weak avalanche effects, vulnerabilities could increase allowing intruders to connect to fake devices that could also be used in such attacks [37], [95].…”
Section: Types Of Attacks On Internet Of Thingsmentioning
confidence: 99%
“…This attack is the same as differential cryptanalysis attack but instead of attacking all rounds of algorithms, half of algorithm's rounds are attack depending on the characteristics (weakness and strength) of algorithm [117]. Ali [118] were compared because they yielded almost the same results (that was almost 33% in average) of avalanche effect [94], and both MTEA and TEA had poor avalanche effect (that was less than 50%).…”
Section: Related Workmentioning
confidence: 99%
“…However, in the project security problems are taken place by increasing information flow. In that regard, various security algorithms are being developed [14].…”
Section: Resultsmentioning
confidence: 99%
“…The involvement of various components makes MARS very complex to analyze and implement in hardware. Abdelhalim et al proposed the modified TEA algorithm (MTEA) [35], which improves the security of TEA and power consumption. The linear feedback shift register (LFSR) is used as a pseudo-random number generator to improve the security of the TEA and power utilization.…”
Section: Related Workmentioning
confidence: 99%