{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T03:32:02Z","timestamp":1706758322417},"reference-count":15,"publisher":"World Scientific Pub Co Pte Lt","issue":"07","funder":[{"name":"Bahria (Naval) University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2016,7]]},"abstract":" Security and privacy are the two major concerns of radio-frequency identification (RFID) based identification systems. Several researchers have proposed ultralightweight mutual authentication protocols (UMAPs) to ensure the security of the low cost RFID tags in recent years. However, almost all of the previously proposed protocols have some serious security flaws and are vulnerable to various security attacks (full disclosure attack, desynchronization attack, impersonation attack, etc.). Recently, a more sophisticated and robust UMAP: Robust confidentiality integrity and authentication (RCIA)1<\/jats:sup> [U. Mujahid, M. Najam-ul-Islam and M. Ali Shami, RCIA: A new ultralightweight RFID authentication protocol using recursive hash, Int. J. Distrib. Sens. Netw. 2015 (2015) 642180] has been proposed. A new ultralightweight primitive, \u201crecursive hash\u201d has been used extensively in the protocol design which provides hamming weight unpredictability and irreversibility to ensure optimal security. In addition to security and privacy, small chip area is another design constraint which is mandatory requirement for a protocol to be considered as ultralightweight authentication protocol. Keeping in view the scenario presented above, this paper presents the efficient hardware implementation of the RCIA for EPC-C1G2 tags. Both the FPGA and ASIC implementation flows have been adopted. The FPGA design flow is primarily used to validate the functionality of the proposed hardware design whereas ASIC design (using TSMC 0.35 \u03bcm library) is used to validate the gate count. To the best of our knowledge, this is the first FPGA and ASIC implementation of any ultralightweight RFID authentication protocol. The simulation and synthesis results of the proposed optimal hardware architecture show the compatibility of the RCIA with extremely low cost RFID tags. <\/jats:p>","DOI":"10.1142\/s021812661650078x","type":"journal-article","created":{"date-parts":[[2016,3,17]],"date-time":"2016-03-17T11:11:27Z","timestamp":1458213087000},"page":"1650078","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol"],"prefix":"10.1142","volume":"25","author":[{"given":"Umar","family":"Mujahid","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Bahria University, Islamabad Campus, ICT Capital, Pakistan"}]},{"given":"Atif Raza","family":"Jafri","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Bahria University, Islamabad Campus, ICT Capital, Pakistan"}]},{"given":"M.","family":"Najam-ul-Islam","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Bahria University, Islamabad Campus, ICT Capital, Pakistan"}]}],"member":"219","published-online":{"date-parts":[[2016,4,22]]},"reference":[{"key":"S021812661650078XBIB001","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/642180"},{"key":"S021812661650078XBIB002","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.031212.120237"},{"key":"S021812661650078XBIB003","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70226"},{"key":"S021812661650078XBIB007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76788-6_9"},{"key":"S021812661650078XBIB010","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.75"},{"key":"S021812661650078XBIB011","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.26"},{"key":"S021812661650078XBIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.12.001"},{"key":"S021812661650078XBIB016","first-page":"6","volume":"1","author":"Yeh K. H.","year":"2010","journal-title":"Inf. Assur. Secur. Lett."},{"key":"S021812661650078XBIB018","first-page":"58","volume":"5","author":"Zubair M.","year":"2012","journal-title":"BUJICT J."},{"key":"S021812661650078XBIB021","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0394.2012.00652.x"},{"key":"S021812661650078XBIB022","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2013.01.003"},{"key":"S021812661650078XBIB024","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2011.2170216"},{"key":"S021812661650078XBIB025","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2270404"},{"key":"S021812661650078XBIB027","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1958-x"},{"key":"S021812661650078XBIB029","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v007.i03"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S021812661650078X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T15:58:28Z","timestamp":1565193508000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S021812661650078X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,22]]},"references-count":15,"journal-issue":{"issue":"07","published-online":{"date-parts":[[2016,4,22]]},"published-print":{"date-parts":[[2016,7]]}},"alternative-id":["10.1142\/S021812661650078X"],"URL":"https:\/\/doi.org\/10.1142\/s021812661650078x","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"value":"0218-1266","type":"print"},{"value":"1793-6454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,22]]}}}