Security Implementation Using Present-Puffin Protocol
Loading...
Authors
Baashirah, Rania
Kommareddy, Anusha
Batchu, Sumanth Kumar
Sunku, Vinusha
Ginjupalli, Rithvik Sai
Abuzneid, Shakour
Issue Date
2018-03-23
Type
Other
Language
en_US
Keywords
Electronic product code generation 2 , Encryption , Reader , Tag
Alternative Title
Abstract
The Electronic Product Code Generation 2 (EPC GEN2) protocol does not have any technique to authenticate the Reader before it gives access to the Tag’s memory. In this paper, we use security implementation and mutual authentication between tag and reader of three different lightweight ciphers. We used Hummingbird (HB), PRESENT, and Extended Tiny Encryption Algorithm (XTEA) to encrypt the data and implemented all three algorithms to FPGA devices. We finally implemented PRESENT with PUFFIN as a trail and we got better results compared to the former three ciphers based on performance, data blocks and execution time.
