Security Implementation Using Present-Puffin Protocol

Loading...
Thumbnail Image

Authors

Baashirah, Rania
Kommareddy, Anusha
Batchu, Sumanth Kumar
Sunku, Vinusha
Ginjupalli, Rithvik Sai
Abuzneid, Shakour

Issue Date

2018-03-23

Type

Other

Language

en_US

Keywords

Electronic product code generation 2 , Encryption , Reader , Tag

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

The Electronic Product Code Generation 2 (EPC GEN2) protocol does not have any technique to authenticate the Reader before it gives access to the Tag’s memory. In this paper, we use security implementation and mutual authentication between tag and reader of three different lightweight ciphers. We used Hummingbird (HB), PRESENT, and Extended Tiny Encryption Algorithm (XTEA) to encrypt the data and implemented all three algorithms to FPGA devices. We finally implemented PRESENT with PUFFIN as a trail and we got better results compared to the former three ciphers based on performance, data blocks and execution time.

Description

Citation

Publisher

License

Journal

Volume

Issue

PubMed ID

DOI

ISSN

EISSN