HBC entity authentication for low-cost pervasive devices

被引:2
|
作者
Li, Z. [1 ]
Gong, G. [2 ]
机构
[1] Cisco Syst Co, Ottawa, ON, Canada
[2] Univ Waterloo, Dept Elect Comp & Engn, Waterloo, ON N2L 3G1, Canada
关键词
PROTOCOLS; SECURITY;
D O I
10.1049/iet-ifs.2011.0052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The HB-like entity authentication protocols for low-cost pervasive devices have attracted a great deal of attention because of their simplicity, computational efficiency and solid security foundation on a well-studied hard problem-learning parity with noise. By far, the most efficient protocol is HB#, which is provably resistant to the GRS attack under the conjecture that it is secure in the DET-model. However, in order to achieve 80-bit security, a typical HB# authentication key comprises over 1000 bits, which imposes considerable storage burdens on resource-constrained devices. In this study, the authors propose a new HB-like protocol: HBC. The protocol makes use of a special type of circulant matrix, in contrast to the Toeplitz matrix in HB#, to significantly reduce storage consumption and overcome a subtle security proof inefficacy in HB#. In addition, the authors introduce a masking technique that substantially increases noise level from an adversary's standpoint, and thus improves protocol performance. The authors demonstrate that 613-bit authentication key suffices for 80-bit security in the HBC protocol, which is quite competitive and more appealing for low-cost devices.
引用
收藏
页码:212 / 218
页数:7
相关论文
共 50 条
  • [21] BINER: A low-cost biomedical named entity recognition
    Asghari, Mohsen
    Sierra-Sosa, Daniel
    Elmaghraby, Adel S.
    [J]. INFORMATION SCIENCES, 2022, 602 : 184 - 200
  • [22] An efficient authentication protocol for low-cost RFID systems
    Jin, Zhen-Ai
    Cho, Hyun-Ju
    Yoo, Kee-Young
    [J]. AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2007, 4496 : 999 - +
  • [23] RFID Authentication Protocol for Low-cost RFID Tags
    Kang, BooJoong
    Kim, Hye Seon
    Kim, Eui-Hyung
    Kim, Hyong-Shik
    Im, Eul Gyu
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
  • [24] Low-cost fitness and activity trackers for biometric authentication
    Khan, Saad
    Parkinson, Simon
    Liu, Na
    Grant, Liam
    [J]. Journal of Cybersecurity, 2020, 6 (01): : 1 - 10
  • [25] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 788 - +
  • [26] Spacing based Authentication Protocol for Low-Cost RFID
    Jin, Zhen-Ai
    Cheng, Zi-Qiang
    Yoo, Kee-Young
    [J]. FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 158 - +
  • [27] Quantitative Analysis for Authentication of Low-cost RFID Tags
    Paparrizos, Ioannis
    Basagiannis, Stylianos
    Petridou, Sophia
    [J]. 2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 295 - 298
  • [28] Authentication with low-cost RFID tags in mobile networks
    Yen, Chih-Ta
    Guo, Ming-Huang
    Lo, Nai-Wei
    Deng, Der-Jiunn
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 1021 - 1027
  • [29] A Novel RFID Authentication Protocol for Low-Cost Tags
    Wu, Dan
    Chen, Geng
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 43 - 46
  • [30] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1101 - 1104