2011 IEEE International Conference on RFID-Technologies and Applications 2011
DOI: 10.1109/rfid-ta.2011.6068669
|View full text |Cite
|
Sign up to set email alerts
|

Security implementation within GEN2 protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(15 citation statements)
references
References 13 publications
0
15
0
Order By: Relevance
“…Seshabhatta et al proposed [15] the integration of two security levels to secure the EPC GEN2 communication between a tag and a reader. The level1 is represented in the secure identification phase that allows the security of the tag identity, whereas the level2 is represented in the mutual authentication protocol that allows to ensure the authenticity of the reader and the tag.…”
Section: A Mutual Authentication Protocol Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Seshabhatta et al proposed [15] the integration of two security levels to secure the EPC GEN2 communication between a tag and a reader. The level1 is represented in the secure identification phase that allows the security of the tag identity, whereas the level2 is represented in the mutual authentication protocol that allows to ensure the authenticity of the reader and the tag.…”
Section: A Mutual Authentication Protocol Descriptionmentioning
confidence: 99%
“…Indeed, for resource limited embedded systems, it is important to use an adapted level of security (often related to the number of bits of the secret key) in order to reduce both hardware overhead and power consumption. For example, Sai Seshabhattar et al [15] proposed an implementation of PRESENT in EPC Class1 Gen2 protocol for UHF RFID tags. They implemented a low cost mutual authentication protocol based on encryption operations in the tag and decryption operations in the reader.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In a query command, using typical parameters (i.e., DR = 8, M = 1, and, therefore, a link rate of 128 kbps), the T1 boundary becomes 78.125 µs. Some implementations use a 2‐MHz chip clock rate, which leaves a maximum of 157 clocks cycles for protocol execution .…”
Section: Secure Management Of Rfid Nodes and Sensors In The Architecturementioning
confidence: 99%
“…The work is compared with yet-another Trivial Authentication protocol with improvements in the computational effort and implemented in real-time environments. The EPC GEN-2 protocol design with Humming-bird (HB), XTEA, and PRESENT security algorithms are designed for mutual authentication by Seshabhattar et al [19]. The GEN2 protocol includes command detection module, Finite state machine (FSM) along with Response module for Tag identification.…”
Section: Introductionmentioning
confidence: 99%