A lightweight many-to-many authentication protocol for near field communications
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review
Standard
A lightweight many-to-many authentication protocol for near field communications. / Petrov, Vitaly; Komar, Maria; Koucheryavy, Yevgeni.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013. IEEE COMPUTER SOCIETY PRESS, 2013. 6733633.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review
Harvard
APA
Vancouver
Author
Bibtex - Download
}
RIS (suitable for import to EndNote) - Download
TY - GEN
T1 - A lightweight many-to-many authentication protocol for near field communications
AU - Petrov, Vitaly
AU - Komar, Maria
AU - Koucheryavy, Yevgeni
PY - 2013
Y1 - 2013
N2 - In this paper the lightweight many-to-many authentication protocol, that uses Near Field Communications as a carrier technology is proposed. The solution works without any user interaction and can be applied for almost any data storage device: NFC or RFID tag, USB-flash drive, etc. The major novelty of the system is real-time encryption key generation algorithm. This approach doesn't require any computation power on the tag, trusted third parties or secure link between tag and information system. So far, the mentioned features transforms to significant advantages of the proposed solution, while compared to existing analogues: OAuth, Opacity and LMAP. At the same time, the integrity of key sequences is not guarantied, that brings motivation for future research in the field.
AB - In this paper the lightweight many-to-many authentication protocol, that uses Near Field Communications as a carrier technology is proposed. The solution works without any user interaction and can be applied for almost any data storage device: NFC or RFID tag, USB-flash drive, etc. The major novelty of the system is real-time encryption key generation algorithm. This approach doesn't require any computation power on the tag, trusted third parties or secure link between tag and information system. So far, the mentioned features transforms to significant advantages of the proposed solution, while compared to existing analogues: OAuth, Opacity and LMAP. At the same time, the integrity of key sequences is not guarantied, that brings motivation for future research in the field.
UR - http://www.scopus.com/inward/record.url?scp=84896795715&partnerID=8YFLogxK
U2 - 10.1109/ICNP.2013.6733633
DO - 10.1109/ICNP.2013.6733633
M3 - Conference contribution
SN - 9781479912704
BT - Proceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013
PB - IEEE COMPUTER SOCIETY PRESS
ER -