A Flexible Gimli Hardware Implementation in FPGA and Its Application to RFID Authentication Protocols
نویسندگان
چکیده
Radio Frequency Identification (RFID) systems have bestowed numerous conveniences in a multitude of applications, but the underlying wireless communications architecture makes it vulnerable to several security threats. To mitigate these issues, various authentication protocols been proposed. The literature accommodates comprehensive proposals and analysis protocols, not many them provide hardware implementations. In addition, there is diverse demand for area throughput (TP) requirements from RFID system components (tags, readers, database servers), which flexible implementation strategy. This paper proposes strategy lightweight authenticated encryption (AE) hash function called Gimli, applies state-of-the-art protocol. allows protocol be implemented efficiently, wherein TP can adjusted flexibly according requirements. generic; used implement any other AE functions. also applied that heavily use detailed analysis, optimization techniques each component are analyzed. When with most area-optimized versions, we achieve 740 Mbps 420 Gimli AE, respectively, throughput-oriented implementation, results 3.08 Gbps 1.43 Gbps, respectively. shows proposed strategies allow us manner meet differing applications.
منابع مشابه
construction and validation of translation metacognitive strategy questionnaire and its application to translation quality
like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...
ASIP Design and FPGA Implementation of Fingerprint Authentication Application
This paper presents an ASIP design for fingerprint authentication application and its implementation on FPGA. The ASIP architecture is derived from existing embedded processor architecture, ARM. In order to optimize the architecture, some redundant features are removed but other new instructions are introduced. Assembly converter tool is employed to solve the compiler generation. Implemented on...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملSAD implementation in FPGA hardware
In this paper, we propose a new unit intended to augment a general-purpose core that is able to perform a SAD operation. We show that the SAD implementation can easily be extended to perform the complete SAD operation. The SAD operation is commonly used in many multimedia standards, including MPEG-1 and MPEG-2. We have chosen to implement the SAD operation in field-programmable gate arrays (FPG...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3100104