By Topic

Time cost evaluation for executing RFID authentication protocols

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Chiew, K. ; Singapore Manage. Univ., Singapore, Singapore ; Yingjiu Li ; Tieyan Li ; Deng, R.H.
more authors

There are various reader/tag authentication protocols proposed for the security of RFID systems. Such a protocol normally contains several rounds of conversations between a tag and a reader and involves cryptographic operations at both reader and tag sides. Currently there is a lack of benchmarks that provide a fair comparison platform for (a) the time cost of cryptographic operations at the tag side and (b) the time cost of data exchange between a reader and a tag, making it impossible to evaluate the total time cost for executing a protocol. Based on our experiments implemented on IAIK UHF tag emulators (known as DemoTags), in this paper we present detailed benchmarks of both time costs for RFID authentication protocols. Our results reveal that the data exchange dominates the time cost for running a protocol. We also give a classification for the existing protocols and summarise formulae of time cost evaluation for each type of protocols in a way so that a user can evaluate the time cost of a protocol amongst several choices of cryptographic operations in an application.

Published in:

Internet of Things (IOT), 2010

Date of Conference:

Nov. 29 2010-Dec. 1 2010