Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Umar Mujahid is active.

Publication


Featured researches published by Umar Mujahid.


International Journal of Distributed Sensor Networks | 2015

RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash:

Umar Mujahid; Muhammad Najam-ul-Islam; M. Ali Shami

RFID is one of the most protuberant systems in the field of ubiquitous computing. Since RFID tags have limited computation capabilities, numerous ultralightweight authentication protocols have been proposed to provide privacy and security. However all the previously proposed ultralightweight mutual authentication protocols have some security apprehensions and are vulnerable to various desynchronization and full disclosure attacks. This paper proposes a new ultralightweight mutual authentication protocol to provide robust confidentiality, integrity, and authentication (RCIA) in a cost effective manner. RCIA introduces a new ultralightweight primitive recursive hash, which efficiently detects the message tempering and also avoids all possible desynchronization attacks. RCIA involves only bitwise operations such as XOR, AND, left rotation, and recursive hash. Performance evaluation illustrates that RCIA requires less resources on tag in terms of on-chip memory, communication cost, and computational operations.


Wireless Personal Communications | 2017

A New Ultralightweight RFID Authentication Protocol for Passive Low Cost Tags: KMAP

Umar Mujahid; Muhammad Najam-ul-Islam; Shahzad Sarwar

Radio Frequency IDentification (RFID) is one of the most promising identification schemes in the field of pervasive systems. Unique identification and non-line of sight capabilities make RFID systems more protuberant than its contending systems. As RFID systems incorporate wireless channel, there are some allied security threats and apprehensions to the systems from malicious adversaries. In order to make the system reliable and secure, numerous Ultralightweight Mutual Authentication Protocols (UMAPs) have been proposed which involve only simple bitwise logical operations (AND, XOR & OR etc.) in their designs. However, almost all of the previously proposed UMAPs are reported to be vulnerable against various security attacks (Desynchronization and Full disclosure attacks etc.). In this paper, we propose a new pseudo-Kasami code based Mutual Authentication Protocol (KMAP). The proposed protocol, KMAP, avoids unbalanced logical operations (OR, AND) and introduces a new Ultralightweight primitive: pseudo-Kasami code (Kc). The newly proposed primitive (pseudo-Kasami code) enhances the diffusion properties of the protocol messages and makes hamming weight of the secrets unpredictable and irreversible. The security analysis illustrates that the KMAP provides excellent protocol functionalities and is also highly resistive against all possible attacks. The performance evaluation shows that the KMAP requires fewer resources on the tag in terms of on-chip memory, communication cost and computational operations.


International Journal of Distributed Sensor Networks | 2016

A new ultralightweight RFID mutual authentication protocol: SASI using recursive hash

Umar Mujahid; Muhammad Najam-ul-Islam; Atif Raza Jafri; Qurat-ul-Ain; M. Ali Shami

RFID is one of the most prominent identification schemes in the field of pervasive systems. Nonline of sight capability makes RFID systems much better choice than its contended systems (such as barcode, magnetic tape, etc.). Since the RFID uses wireless channel for communication with its associated devices, there should be some optimal encryption methods to secure the communicating data from adversaries. Several researchers have proposed ultralightweight mutual authentication protocols (UMAPs) to secure the RFID systems in cost effective manner. Unfortunately most of the previously proposed UMAPs are later found to be vulnerable against various desynchronization, Denial of Service (DoS), traceability, and full disclosure attacks. In this paper, we present a more sophisticated UMAP to provide Strong Authentication and Strong Integrity (SASI) using recursive hash function. The proposed protocol incorporates only simple bitwise logical operators XOR, Rot, and nontriangular function (recursive hash) in its design, which can be efficiently implemented with a low cost passive RFID tag. The performance analysis of the protocol proves the conformation of the proposed protocol with EPC-C1G2 passive tags. In addition to privacy and security, small chip area (miniaturization) is another design constraint (which is mandatory requirement for a protocol to be considered as ultralightweight authentication protocol). We have also proposed and implemented the efficient hardware design of the proposed protocol for EPC-C1G2 tags. Both the FPGA and ASIC implementation flows have been adopted. The FPGA flow is primarily used to validate the functionality of the proposed hardware design whereas ASIC flow (using TSMC 0.35 μm library) is used to validate the gate count. To the best of our knowledge, this is the first FPGA and ASIC implementation of any ultralightweight RFID authentication protocol.


open source systems | 2014

Cryptanalysis of mutual ultralightweight authentication protocols: SASI & RAPP

Qurat Ul Ain; Yusra Mahmood; Umar Mujahid; Muhammad Najam-ul-Islam

Radio Frequency Identification (RFID) is among the widely deployed identification scheme. Massive deploymentof RFID systems has also raised many security related issues which in return evokes the need of security algorithms and authentication protocols. To make the system practically feasible many Ultralightweight Authentication protocols have appeared in the prose, these Ultralightweight Protocols uses simple bitwise logical operations. Disastrously, all of these protocols are susceptible to the attacks. In this paper we have performeda comparative analysis (cryptanalysis) of the two protocols; Strong Authentication and Strong Integrity (SASI) and RFID Authentication Protocol based on Permutation (RAPP). Finally we have also projected a novel ultralightweight mutual authentication protocol; Advanced SASI, which combats against all possible attacks and cryptanalysis. Finally, a comparison of Advanced SASI with SASI and RAPP has also been performed to highlight robustness of the newly proposed algorithm as compare to its contending algorithms.


Journal of Circuits, Systems, and Computers | 2018

Efficient Hardware Implementation of KMAP+: An Ultralightweight Mutual Authentication Protocol

Umar Mujahid; Muhammad Najam-ul-Islam; Madiha Khalid

Internet of Things (IoTs) are becoming one of the integral parts of our lives, as all of the modern devices including pervasive systems use internet for its connectivity with the rest of the world. The Radio Frequency IDentification (RFID) provides unique identification and nonline of sight capabilities, therefore plays a very important role in development of IoTs. However, the RFID systems incorporate wireless channel for communication, therefore have some allied risks to the system from threat agents. In order to prevent the system from malicious activities in a cost effective way, numerous Ultralightweight Mutual Authentication Protocols (UMAPs) have been proposed since last decade. These UMAPs mainly involve simple bitwise logical operators such as XOR, AND, OR, etc., in their designs and can be implemented with extremely low cost RFID tags. However, most of the UMAP designers didn’t provide the proper hardware approximations of their UMAPs and presented only theoretical results which mostly mislead t...


Journal of Circuits, Systems, and Computers | 2016

Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol

Umar Mujahid; Atif Raza Jafri; Muhammad Najam-ul-Islam

Security and privacy are the two major concerns of radio-frequency identification (RFID) based identification systems. Several researchers have proposed ultralightweight mutual authentication protocols (UMAPs) to ensure the security of the low cost RFID tags in recent years. However, almost all of the previously proposed protocols have some serious security flaws and are vulnerable to various security attacks (full disclosure attack, desynchronization attack, impersonation attack, etc.). Recently, a more sophisticated and robust UMAP: Robust confidentiality integrity and authentication (RCIA)1 [U. Mujahid, M. Najam-ul-Islam and M. Ali Shami, RCIA: A new ultralightweight RFID authentication protocol using recursive hash, Int. J. Distrib. Sens. Netw. 2015 (2015) 642180] has been proposed. A new ultralightweight primitive, “recursive hash” has been used extensively in the protocol design which provides hamming weight unpredictability and irreversibility to ensure optimal security. In addition to security and...


2015 International Conference on Computing, Communication and Security (ICCCS) | 2015

Hardware implementation of ultralightweight cryptographic protocols

Qurat Ul Ain; Umar Mujahid; Muhammad Najam-ul-Islam

RFID (Radio Frequency Identification) is among the most emerging and tremendously growing technologies in the field of automatic identification. The technology is far better than its other contending systems such as Barcodes and magnetic tapes as it provides optimal communication link with non line of sight capability. Several researchers have proposed various ultralightweight RFID authentication protocols to provide cost effective security solutions. However, the proper hardware implementation of these ultralightweight authentication protocols has been neglected long which develops a chaos of their practical feasibility. In this paper, we have addressed this problem and proposed generic hardware architecture for EPC-C1G2 tags. We have also simulated four ultralightweight authentication protocols (SASI, LMAP, David-Prasad and RAPP) using ModelSim PE and synthesized using Xilinx Design Suite 14.5. Algorithm has been successfully implemented in hardware using Spartan 6 (Low Power) and Vertex 7 Field Programmable Gate Array (FPGA). We believe that the proposed architecture and simulated results will act as the stepping stone for the future implementation of these low cost RFID tags for ASIC.


international multi topic conference | 2014

A novel lightweight pseudorandom number generator for passive RFID systems

Umar Mujahid; Muhammad Najam-ul-Islam; Adnan Sharif; Tauqeer Khan; Adnan Qavi; Bilal

RFID is one of the most promising identification schemes in the field of ubiquitous computing. Non line of sight capability makes RFID systems more protuberant than its other alternative systems. RFID systems incorporate wireless medium, so there are some associated security threats and apprehensions to system from malicious adversaries. In order to make the system more reliable and secure, numerous researchers have proposed lightweight authentication protocols; which comprises of pseudorandom number generators in their designs. The presence of pseudorandom numbers not only introduces the randomness in the system but also enhance the diffusion properties of the protocols. In this paper, we have proposed a novel lightweight random number generator “RL-PRNG” for low cost pervasive systems. Performance analysis of proposed random number generator in terms of hardware with LFSR, LCG, AKARI-1 and AKARI-2 depicts that the proposed random number generator is much more lightweight in nature. Statistical properties of the pseudorandom number generator has been tested on well-established statistical tests; NIST, DIEHARD and ENT.


2017 International Conference on Communication, Computing and Digital Systems (C-CODE) | 2017

Security framework of Ultralightweight Mutual Authentication Protocols for low cost RFID tags

Madiha Khalid; Umar Mujahid

RFID is one of the rapidly growing identification schemes. Unique identification, non-line of sight capability and functional haste result its massive deployment in many supply chain applications. Because of limited computational capabilities at tag side Ultra lightweight protocols are the only solution to ensure secure communication in RFID systems. In this paper we have presented a detailed working of three eminent UMAPs. Further, a generic desynchronization attack model on these UMAPs has been discussed. Then finally, a novel security framework for low cost UMAPs has been presented to avoid all possible desynchronization attacks. The proposed security model is generic in nature therefore can be implemented to all upcoming UMAPs as well.


Results in physics | 2017

Refractivity variations and propagation at Ultra High Frequency

Imtiaz Alam; Muhammad Najam-ul-Islam; Umar Mujahid; Syed Asim Ali Shah; Rizwan Ul Haq

Collaboration


Dive into the Umar Mujahid's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge