Presentation is loading. Please wait.

Presentation is loading. Please wait.

Time Cost Evaluation for Executing RFID Authentication Protocols Yingjiu Li, Ph.D. Associate Professor School of Information Systems Singapore Management.

Similar presentations


Presentation on theme: "Time Cost Evaluation for Executing RFID Authentication Protocols Yingjiu Li, Ph.D. Associate Professor School of Information Systems Singapore Management."— Presentation transcript:

1 Time Cost Evaluation for Executing RFID Authentication Protocols Yingjiu Li, Ph.D. Associate Professor School of Information Systems Singapore Management University Singapore

2 Introduction Time cost of cryptographic operations Time cost of communications Protocol classification and time cost Conclusion Contents

3 Introduction Time cost of cryptographic operations Time cost of communications Protocol classification and time cost Conclusion Contents

4 Time cost for executing an authentication protocol consists of three parts –Tr: time cost for cryptographic operations and looking up a database at a reader side –Tt: time cost for cryptographic operations at a tag side –Tc: time cost of communication between a reader and a tag Objective –Provide a benchmark for protocol development Introduction

5 Development Environment –Emulator: UHF DemoTag, IAIK, TU Graz, Austria –Reader: CAEN WA828, Italy We focus on Tt and Tc –Tr is negligible as compared with Tt and Tc Introduction Atmega 128 microcontroller

6 Introduction Time cost of cryptographic operations Time cost of communications Protocol classification and time cost Conclusion Contents

7 Time cost for a DemoTag to run cryptographic operations: –Hashing: MD5, SHA-1, SHA-256, SHA-512 –Crypto: AES-128, AES-192, AES-256 –Ultra-lightweight: PRESENT-80 Time cost of cryptographic operations

8 Time cost for a DemoTag to run cryptographic operations: –Hashing: MD5, SHA-1, SHA-256, SHA-512 –Crypto: AES-128, AES-192, AES-256 –Ultra-lightweight: PRESENT-80 Time cost of cryptographic operations

9 Introduction Time cost of cryptographic operations Time cost of communications Protocol classification and time cost Conclusion Contents

10 Time cost of communications –Tag-to-tag Read/Write operations Read: 0007ms / 16-bit word Write: 16.7ms / 16-bit word –Reader-to-tag Read/Write operations Time cost of communications

11 Introduction Time cost of cryptographic operations Time cost of communications Protocol classification and time cost Conclusion Contents

12 Four types of authentication protocols –RAO: reader authentication only A reader authenticates its legitimacy to a tag –TAO: tag authentication only A tag authenticates its legitimacy to a reader –TRA: tag-then-reader authentication A tag authenticates its legitimacy to a reader and then the reader authenticates its legitimacy to the tag –RTA: reader-then-tag authentication A reader authenticates its legitimacy to a tag and then the tag authenticates its legitimacy to the reader Protocol classification and time cost

13 Four types of authentication protocols –Different types of protocols have different numbers of rounds of communications between a reader and a tag Communication time Tc takes the major time cost for executing a protocol, as shown in the figure in the next slide Protocol classification and time cost

14 Communication time Tc takes the major time cost for executing a protocol, as shown in the figure Protocol classification and time cost

15 Introduction Time cost of cryptographic operations Time cost of communications Protocol classification and time cost Conclusion Contents

16 We have conducted pioneering study for time cost evaluation of RFID authentication protocols Future work –Conduct some other asymmetric cryptographic operations like ECC, RSA, etc –Conduct experiments on WISP tag platform Conclusion

17 Question?


Download ppt "Time Cost Evaluation for Executing RFID Authentication Protocols Yingjiu Li, Ph.D. Associate Professor School of Information Systems Singapore Management."

Similar presentations


Ads by Google