Papers by Batbold Toiruul

International Journal of Computer Science and …, 2006
The biggest challenge for current RFID technology is to provide the necessary benefits while avoi... more The biggest challenge for current RFID technology is to provide the necessary benefits while avoiding any threats to the privacy of its users. Although many solutions to this problem have been proposed, almost as soon as they have been introduced, methods have been found to circumvent system security and make the user vulnerable. We are proposing an advanced mutualauthentication protocol between a tag and the back-end database server for a RFID system to ensure system security integrity. The three main areas of security violations in RFID systems are forgery of the tags, unwanted tracking of the tags, and unauthorized access to a tag's memory. Our proposed system protects against these three areas of security violations. Our protocol provides reader authentication to a tag, exhibits forgery resistance against a simple copy, and prevents the counterfeiting of RFID tags. Our advanced mutual-authentication protocol uses an AES algorithm as its cryptograph primitive. Since our AES algorithm has a relatively low cost, is fast, and only requires simple hardware, our proposed approach is feasible for use in RFID systems. In addition, the relatively low computational cost of our proposed algorithm compared to those currently used to implement similar levels of system security makes our proposed system especially suitable for RFID systems that have a large number of tags.
Advanced Mutual-Authentication for RFID System using AES algorithm
Proceedings of the 5th Wseas International Conference on Data Networks Communications and Computers, Oct 16, 2006
Radio Frequency Identification (RFID) is a method of identifying the unique items using radio wav... more Radio Frequency Identification (RFID) is a method of identifying the unique items using radio waves. The RFID based supply chain management yields convenience, efficiency and productivity gains. Based on the pervasive deployment of RFID tags, we develop a new RFID application, which is developed to serve farmers' products in aggregation center through the supply chain. The objective of this research is to describe how the RFID application software can be applied and how we can design the RFID SCM application software. This RFID application provides an effective way to manage all the relevant information through the whole supply chain by writing/reading data to/from tag and updating the database automatically or manually.

Lecture Notes in Computer Science, 2006
The biggest challenge for current RFID technology is to provide the necessary benefits while avoi... more The biggest challenge for current RFID technology is to provide the necessary benefits while avoiding any threats to the privacy of its users. Although many solutions to this problem have been proposed, almost as soon as they have been introduced, methods have been found to circumvent system security and make the user vulnerable. We are proposing an advanced mutualauthentication protocol between a tag and the back-end database server for a RFID system to ensure system security integrity. The three main areas of security violations in RFID systems are forgery of the tags, unwanted tracking of the tags, and unauthorized access to a tag's memory. Our proposed system protects against these three areas of security violations. Our protocol provides reader authentication to a tag, exhibits forgery resistance against a simple copy, and prevents the counterfeiting of RFID tags. Our advanced mutual-authentication protocol uses an AES algorithm as its cryptograph primitive. Since our AES algorithm has a relatively low cost, is fast, and only requires simple hardware, our proposed approach is feasible for use in RFID systems. In addition, the relatively low computational cost of our proposed algorithm compared to those currently used to implement similar levels of system security makes our proposed system especially suitable for RFID systems that have a large number of tags.
A hybrid zone routing protocol for large ad hoc wireless sensor networks
Journal of Convergence Information Technology, 2011
A Secure Authentication Protocol for Low-Cost Radio Frequency Identification Systems based on Modular Exponentiation
Journal of Convergence Information Technology, 2011

SLAP - A Secure but Light Authentication Protocol for RFID Based on Modular Exponentiation
International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07), 2007
The advantage of using RFID technology is gaining much attention as is seen by an increase in its... more The advantage of using RFID technology is gaining much attention as is seen by an increase in its deployment. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. This work describes simple, inexpensive, and untraceable mutual identification protocols based on modular exponentiation for RFID tags. The proposed authentication mechanism is a low-cost but high-security for protecting consumer's information in RFID tag against unwanted read-attacks. We analyzed with issues of the security and privacy of RFID systems. This paper also showed the 8-bit architecture of a low-power and low die-size implementation of modular exponentiation. The 8-bit modular exponentiation implementation has a chip area of less than 1 K gates and the encryption of 64 bits requires about 1000 clock cycles. The executing time of the proposed protocol would range from 12.36 ms to 20.6 ms, with 6-8 tags authenticated per second.
Uploads
Papers by Batbold Toiruul