About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Industrial Networks and Intelligent Systems. 7th EAI International Conference, INISCOM 2021, Hanoi, Vietnam, April 22-23, 2021, Proceedings

Research Article

How to Develop ECC-Based Low Cost RFID Tags Robust Against Side-Channel Attacks

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-77424-0_35,
        author={Manh-Hiep Dao and Vincent Beroulle and Yann Kieffer and Xuan-Tu Tran},
        title={How to Develop ECC-Based Low Cost RFID Tags Robust Against Side-Channel Attacks},
        proceedings={Industrial Networks and Intelligent Systems. 7th EAI International Conference, INISCOM 2021, Hanoi, Vietnam, April 22-23, 2021, Proceedings},
        proceedings_a={INISCOM},
        year={2021},
        month={5},
        keywords={ECC RFID Side-channel attack Implementation Authentication protocol},
        doi={10.1007/978-3-030-77424-0_35}
    }
    
  • Manh-Hiep Dao
    Vincent Beroulle
    Yann Kieffer
    Xuan-Tu Tran
    Year: 2021
    How to Develop ECC-Based Low Cost RFID Tags Robust Against Side-Channel Attacks
    INISCOM
    Springer
    DOI: 10.1007/978-3-030-77424-0_35
Manh-Hiep Dao1,*, Vincent Beroulle1, Yann Kieffer1, Xuan-Tu Tran2
  • 1: Univ. Grenoble Alpes, Grenoble INP, LCIS
  • 2: SISLAB
*Contact email: manh-hiep.dao@lcis.grenoble-inp.fr

Abstract

Radio Frequency Identification (RFID) tags using asymmetric cryptography are more and more proposed to solve the well-known issue of symmetric-based tags, key distribution. In the asymmetric cryptography family, the Elliptic Curve Cryptography (ECC) primitive is often used due to its advantages in security and implementation costs. However, these ECC-based tags must still be hardened against hardware fault attacks (e.g., Side-Channel Attacks and Fault attacks). Balancing between the implementation costs and the security level is challenging since when the security level is improved, the implementation cost also increases much. Finding optimal implementations against hardware attacks is a system-level problem that must be taken authentication protocol security attributes and cryptography primitive costs into account. This paper proposes a methodology to develop low-cost ECC-based tags, ensuring robustness against Side-Channel Attacks. For that, a comparison of various authentication protocols and different ECC algorithms is first given, then an experimental setup is described to allow validating the implementations and measuring the robustness of the tag.

Keywords
ECC RFID Side-channel attack Implementation Authentication protocol
Published
2021-05-28
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-77424-0_35
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL