Self-keying Identification Mechanism for Small Devices
We present a strong authentication mechanism intended for embedded systems based on standard but weak processors, without support for cryptographic operations. So far the main effort was to provide methods based on relatively short keys and complex computations, we make advantage of availability of non-volatile memory of larger size and confine ourselves to basic bit operations available on each processor.
Keywordsauthentication random walk standard processor self-keying
Unable to display preview. Download preview PDF.
- 1.Barczyński, K.: Coordinating communication in chosen RFID based systems. Master dissertation, Wrocław University of Technology, Wrocław, Poland (2008)Google Scholar
- 8.Vajda, I., Buttyan, L.: Lightweight authentication protocols for low-cost rfid tags. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864. Springer, Heidelberg (2003)Google Scholar