Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Simulation and verification of security attacks on light-weight RFID protocols
Download
index.pdf
Date
2014
Author
Ahmed, Saman
Metadata
Show full item record
Item Usage Stats
208
views
82
downloads
Cite This
Radio Frequency Identification (RFID) technology is fast reaching all avenues of application. From retail to warehousing, tracking farm animals to monitoring medicine dosage in human body, traffic control to airport baggage control, it is penetrating all forums and industries and providing ease of deployment and automated visibility and management of inventories which was not possible with traditional barcodes. Along with its superiority over barcodes, RFID systems are also required to be costeffective to be fully integrated in commercial products. This means that the price of single tag has to be brought down enough so that it becomes feasible for large scale utilization. Consequently, the commercial tag, which is usually priced between 0.05-0.1 USD, can only contain basic hardware for few logical functions. Hence instead of complex cryptographic solutions, light-weight protocols that require relatively small amount of computations need to be designed to provide security. In this thesis, ultra-lightweight RFID security protocols are examined in light of their security provisions and susceptibility to certain attacks. In particular, LMAP++ protocol presented by Tieyan Li in 2008, is studied and a full disclosure attack presented by Wang Shao-hui et al. in 2012 is applied. It has been seen that this attack is successful and certain new observations have been highlighted. Next, Strong Authentication and Strong Integrity (SASI) protocol, proposed by Hung-Yu Chien in 2007, and Gossamer protocol, proposed by Pedro Peris-Lopez et al. in 2009 to overcome the weakness of LMAP++ have been studied; and a probabilistic attack presented by Eslam Gamal Ahmed in 2010 has been applied on Gossamer. It has been found in this thesis that this attack is unsuccessful, and Gossamer Protocol is in fact, secure against this attack. Further, a Denial-of-Service attack has also been proposed against Gossamer protocol.
Subject Keywords
Public key cryptography.
,
Digital signatures.
,
Lattice theory.
,
Cryptography.
URI
http://etd.lib.metu.edu.tr/upload/12617564/index.pdf
https://hdl.handle.net/11511/23691
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
Evaluation of deep learning based multiple object trackers
Moured, Omar; Akar, Gözde; Department of Electrical and Electronics Engineering (2020-9)
Multiple object tracking (MOT) is a significant problem in the computer vision community due to its applications, including but not limited to, surveillance and emerging autonomous vehicles. The difficulties of this problem lie in several challenges, such as frequent occlusion, interaction, intra-class variations, in-and-out objects, etc. Recently, deep learning MOT methods confront these challenges effectively. State-of-the-art deep learning (DL) trackers pipeline consists of two stages, i.e., appearance h...
Design of a radio frequency identification (rfid) antenna
Kalaycı, Sefa; Birand, Mehmet Tuncay; Department of Electrical and Electronics Engineering (2009)
Fundamental features of Radio Frequency Identification (RFID) systems used in different application areas will be reviewed. Techniques used in realizing RFID antenna systems will be studied and the procedure to realize a specific RFID antenna type possessing desired characteristics will be described. Electrical properties such as radiation pattern, impedance will be predicted using analytical and/or computer simulation techniques. Experimental investigations will be carried out to complement the theoretical...
Near optimal scheduling for opportunistic spectrum access over block fading channels in cognitive radio assisted vehicular network
Gül, Ömer Melih; Kantarci, Burak (2022-10-01)
© 2022 Elsevier Inc.With the increasing use of cognitive radio technology in vehicular communications, vehicles will be enabled with cognitive radio in the future. Cognitive radio assisted vehicular networks make cognitive radio enabled vehicles utilize licensed spectrum on highways opportunistically. This work tackles cognitive radio assisted vehicular networks including M primary users (transmitter), M primary receivers, a secondary user (transmitter) with K channels and K secondary receivers. A channel i...
Effective Use of Low Power Heterogeneous Wireless Multimedia Sensor Networks for Surveillance Applications Using IEEE 802.15.4 Protocol
Kenges, Nurdaulet; Ever, Enver; Yazıcı, Adnan (2021-01-01)
With the recent technological advancements in video sensors, digital signal processing units and digital radio interfaces, low-cost devices such as Wireless Multimedia Sensor Networks (WMSNs) became an important part of surveillance applications. The scarcity of resources for these devices introduces new challenges in terms of energy consumption, and Quality of Service (QoS) guarantees. One of the challenges is processing and transmission of large volumes of multimedia data. In this paper, the efficiency of...
Security analysis of electronic signature applications and test suite study
Ergun, Tamer; Özbudak, Ferruh; Department of Cryptography (2013)
Digital signature technology is used widely for security and trust in electronic business and communications. Nowadays it becomes commonly used especially in government agencies. From this point of view, it is crucial to implement correct applications to create and verify digital signatures. CEN (European Commitee for Standardization) has introduced the security requirements for signature applications but neither proposed a PKI model nor implemented a test suite to evaluate the accuracy of signature applica...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
S. Ahmed, “Simulation and verification of security attacks on light-weight RFID protocols,” M.S. - Master of Science, Middle East Technical University, 2014.